[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 87.182428][ T33] audit: type=1800 audit(1576068201.277:25): pid=12452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 87.208225][ T33] audit: type=1800 audit(1576068201.297:26): pid=12452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 87.228537][ T33] audit: type=1800 audit(1576068201.297:27): pid=12452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.186' (ECDSA) to the list of known hosts. 2019/12/11 12:43:34 fuzzer started 2019/12/11 12:43:39 dialing manager at 10.128.0.26:42787 2019/12/11 12:43:39 syscalls: 2514 2019/12/11 12:43:39 code coverage: enabled 2019/12/11 12:43:39 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/12/11 12:43:39 extra coverage: enabled 2019/12/11 12:43:39 setuid sandbox: enabled 2019/12/11 12:43:39 namespace sandbox: enabled 2019/12/11 12:43:39 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/11 12:43:39 fault injection: enabled 2019/12/11 12:43:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/11 12:43:39 net packet injection: enabled 2019/12/11 12:43:39 net device setup: enabled 2019/12/11 12:43:39 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/11 12:43:39 devlink PCI setup: PCI device 0000:00:10.0 is not available 12:46:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) munmap(&(0x7f0000a00000/0x600000)=nil, 0x600000) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="f31950f7cb85ccae16fa1deff886039b5b79dc84c2786559585652f2c5d2f3e422e13a38997dca9bdaf2b0f6322403f61267", 0x32, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffff77, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000180)) ioctl$KVM_RUN(r2, 0xae80, 0x0) syzkaller login: [ 274.654546][T12618] IPVS: ftp: loaded support on port[0] = 21 [ 274.796398][T12618] chnl_net:caif_netlink_parms(): no params data found [ 274.853151][T12618] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.860343][T12618] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.869034][T12618] device bridge_slave_0 entered promiscuous mode [ 274.880276][T12618] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.887593][T12618] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.896452][T12618] device bridge_slave_1 entered promiscuous mode [ 274.928953][T12618] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 274.942122][T12618] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 274.976711][T12618] team0: Port device team_slave_0 added [ 274.986118][T12618] team0: Port device team_slave_1 added [ 275.146803][T12618] device hsr_slave_0 entered promiscuous mode [ 275.402660][T12618] device hsr_slave_1 entered promiscuous mode [ 275.584175][T12618] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 275.797852][T12618] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 276.016104][T12618] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 276.187605][T12618] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 276.535270][T12618] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.556775][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.565604][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.580909][T12618] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.599567][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.609453][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.618587][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.626840][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.675881][T12618] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 276.686402][T12618] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 276.703601][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.712408][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.721912][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.730819][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.738134][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.747716][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.758012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 276.767940][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 276.777944][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.787484][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 276.797242][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.806830][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 276.816011][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.825655][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 276.834828][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.849476][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 276.858507][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 276.882020][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 276.889643][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.909125][T12618] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 277.060801][T12622] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 12:46:31 executing program 1: r0 = socket$inet6(0xa, 0x40000000003, 0xff) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1b) 12:46:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) munmap(&(0x7f0000a00000/0x600000)=nil, 0x600000) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="f31950f7cb85ccae16fa1deff886039b5b79dc84c2786559585652f2c5d2f3e422e13a38997dca9bdaf2b0f6322403f61267", 0x32, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffff77, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000180)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:46:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) munmap(&(0x7f0000a00000/0x600000)=nil, 0x600000) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="f31950f7cb85ccae16fa1deff886039b5b79dc84c2786559585652f2c5d2f3e422e13a38997dca9bdaf2b0f6322403f61267", 0x32, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffff77, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000180)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 277.596374][T12637] IPVS: ftp: loaded support on port[0] = 21 12:46:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) munmap(&(0x7f0000a00000/0x600000)=nil, 0x600000) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="f31950f7cb85ccae16fa1deff886039b5b79dc84c2786559585652f2c5d2f3e422e13a38997dca9bdaf2b0f6322403f61267", 0x32, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffff77, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000180)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 277.837325][T12637] chnl_net:caif_netlink_parms(): no params data found 12:46:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@local, 0x0, 0x2b}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}}}]}, 0x13c}}, 0x0) [ 278.003508][T12637] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.010756][T12637] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.019927][T12637] device bridge_slave_0 entered promiscuous mode 12:46:32 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r0, &(0x7f0000001700)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}, {{&(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x2, 0x0, 0x0, [@rand_addr="c783ad86aa70894feee539c890ab7920"]}}}], 0x28}}], 0x2, 0x0) [ 278.092674][T12637] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.099878][T12637] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.108660][T12637] device bridge_slave_1 entered promiscuous mode 12:46:32 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000340)=[{{&(0x7f00000004c0)=@nl=@unspec, 0x80, 0x0}}, {{&(0x7f00000000c0)=@generic={0x0, "6762719943994ddb9a920195dc3e3524ef9438596514398b545a274ed94faec2ffb1b254c2b41d76fdb951d9df21d23739eb7db96c042f270ffd5006416f2f12f883d2bdef932cf4d035c60aa014c553dc5d2a558b982d8065ad4253896974cec6d4994510d9b0c57637aee4f07100e51a1d6bfd745122c8193d95147efa"}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) [ 278.185719][T12637] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 278.215286][T12637] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 12:46:32 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)=0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000140)="0f215f0f01cf0fc79b836b660fee1e0e0036de547eba2100b80000ef0f011eebd72e0f01cb66b8010000000f01c1663666660f71f100", 0x36}], 0x1, 0x10, &(0x7f00000001c0)=[@vmwrite={0x8, 0x0, 0x19, 0x0, 0x3, 0x0, 0x1, 0x0, 0xd9}, @cstype0={0x4, 0xe}], 0x2) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth0_to_bond\x00', {0x2, 0x4e24, @loopback}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) utimes(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) [ 278.284758][T12652] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! [ 278.285212][T12637] team0: Port device team_slave_0 added [ 278.315509][T12637] team0: Port device team_slave_1 added [ 278.463873][ C0] hrtimer: interrupt took 30567 ns [ 278.466200][T12637] device hsr_slave_0 entered promiscuous mode 12:46:32 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000004f357c10b5020000002bf6ff00b05f1a"], 0x14}}, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x604000, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) close(r2) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x9d) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$NBD_CLEAR_QUE(r3, 0xab05) getpgid(0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x7fff, 0x7ff, 0x5d, 0x1f, 0x3}) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x9, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@RTM_GETNSID={0x14, 0x5a, 0x429}, 0xfffffffffffffef7}}, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x164, 0x4, 0x6, 0x8, 0x70bd29, 0x25dfdbfe, {0xc, 0x0, 0x2}, [@generic="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"/334]}, 0x164}, 0x1, 0x0, 0x0, 0x20008000}, 0x8040) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) getsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000400)=0x4) sendfile(r4, r5, 0x0, 0x800000000024) socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xa, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x4000) ioctl$MON_IOCQ_URB_LEN(r7, 0x9201) creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) unshare(0x40000000) [ 278.532416][T12637] device hsr_slave_1 entered promiscuous mode [ 278.582304][T12637] debugfs: Directory 'hsr0' with parent '/' already present! [ 278.623653][T12659] IPVS: ftp: loaded support on port[0] = 21 [ 278.699472][T12637] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 278.713861][T12637] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 278.747708][T12659] IPVS: ftp: loaded support on port[0] = 21 [ 278.760101][T12637] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 278.807352][T12637] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 279.116165][T12637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.152678][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 279.161210][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 279.189220][T12637] 8021q: adding VLAN 0 to HW filter on device team0 [ 279.208534][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 279.218072][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.228227][ T630] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.235449][ T630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.285733][T12637] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 279.296556][T12637] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 279.310855][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.319901][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.329362][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.338480][ T630] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.345689][ T630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.354197][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 279.364274][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 279.374197][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 279.384075][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 279.393621][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 279.403429][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 279.412927][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.422210][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.431894][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.441066][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.468224][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 279.477412][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 279.494813][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 279.502984][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 279.523099][T12637] 8021q: adding VLAN 0 to HW filter on device batadv0 12:46:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000180)={0x9, "8ded63635c6890efb37042e88f7942f60f53321103c8efec32bff24e0bdc1d99", 0x0, 0x1}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) accept$inet(r2, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0$v', 0x5019}) 12:46:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/143, &(0x7f00000000c0)=0x8f) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x384f95517d9f9579, @sdr}) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x20], 0x2, 0x4, 0x7fff, 0xff, 0x5, 0x8000, {0x0, 0x3, 0xfff8, 0x6, 0x0, 0x0, 0x0, 0x8000, 0x79, 0x8000, 0x7, 0xd6, 0x0, 0x0, "24c26888281bfdf66453899c22fc5340d43149c8c9a009f5861edb20c023112b"}}) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, 0x0) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000280)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x110) r4 = dup2(r3, 0xffffffffffffffff) setsockopt$inet_group_source_req(r4, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, [@IFLA_LINKINFO={0x2c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x1c, 0x2, [@IFLA_BR_NF_CALL_IPTABLES={0x8}, @IFLA_BR_MCAST_QUERY_USE_IFADDR={0x8}, @IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x4c}}, 0x8010) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000780)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000007c0)={@ipv4={[], [], @remote}, @mcast2, @dev={0xfe, 0x80, [], 0x1c}, 0xffffff93, 0x7ff, 0xfffe, 0x0, 0x2, 0x2780000, r6}) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r7, 0x0) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r8, 0x0) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r9, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r8], &(0x7f0000000380)=0x1) r10 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x1f93e) ioctl$sock_inet_SIOCSIFADDR(r10, 0x8916, &(0x7f0000000040)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @broadcast}}) ioctl$sock_inet_SIOCSIFADDR(r10, 0x8914, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @loopback}}) [ 279.816016][ T1381] tipc: TX() has been purged, node left! 12:46:34 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000081c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/222, 0xde}, {&(0x7f00000007c0)=""/241, 0xf1}, {&(0x7f00000008c0)=""/216, 0xd8}, {&(0x7f00000009c0)=""/247, 0xf7}, {&(0x7f0000000ac0)=""/171, 0xab}], 0x5, 0x0, 0xb8}}], 0x1, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000100), 0xc, &(0x7f0000000740)={&(0x7f00000001c0)=@newchain={0x30, 0x64, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}]}, 0x30}}, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$rxrpc(0x21, 0x2, 0xa) fcntl$dupfd(r2, 0x80c, r3) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x30) ioctl$DRM_IOCTL_IRQ_BUSID(r4, 0xc0106403, &(0x7f0000000b80)={0x20, 0x0, 0x401, 0x49c73082}) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0x49d}, {&(0x7f0000000400)=""/120, 0x2ce}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xb}], 0x161, &(0x7f0000000600)=""/191, 0x97}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) [ 279.945820][T12673] netlink: 'syz-executor.0': attribute type 36 has an invalid length. [ 279.954377][T12673] netlink: 'syz-executor.0': attribute type 24 has an invalid length. [ 280.288940][T12673] netlink: 'syz-executor.0': attribute type 36 has an invalid length. [ 280.299438][T12673] netlink: 'syz-executor.0': attribute type 24 has an invalid length. 12:46:34 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x82800, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f00000000c0)={0x0, 0x0, 0x8001}) readv(r0, &(0x7f0000000b40)=[{&(0x7f0000000b00)=""/37, 0x25}], 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000000)={0x5, 0x1, 0x4}) 12:46:34 executing program 0: r0 = socket(0x2, 0x80002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x40c2, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e22, @rand_addr=0x20}, 0x10) recvfrom(r0, 0x0, 0x0, 0x12062, 0x0, 0x0) 12:46:35 executing program 0: r0 = socket(0x2, 0x80002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x40c2, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e22, @rand_addr=0x20}, 0x10) recvfrom(r0, 0x0, 0x0, 0x12062, 0x0, 0x0) 12:46:35 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0xc) dup2(r2, r1) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) r5 = socket$inet6(0xa, 0x3, 0x100000001) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="020700090200000000008000bd5a00000021472aefe41c4301889c91ff7f000000001600aa20675d9f82d3869feeed860e6cb504000000cad7cb69050046b6e50e067f000000000000c1374611c0dd34c12d100ea73cc21c5ed2ac1e4640dd4d226fdc90887e50f948fcf32bab60844794d3f3477681280d8d206bfebd201986fe24352453e388896c27433690fb"], 0x10}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000380)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r9 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r9, 0xc0bc5310, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_NODES(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x240000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r8, 0x10, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2}, 0x2000400) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r5, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 281.502229][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 281.508543][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:46:35 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) accept$unix(r0, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) r3 = socket$inet6(0xa, 0x3, 0x100000001) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x80000001, 0x111040) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f0000000040)={0x1, 0x4, 0x3, 0x3, 0x4, 0x5}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 281.902673][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 281.908987][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:46:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x1c}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) connect$rds(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cc], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 282.200373][T12783] kvm [12782]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc1 data 0x4d00000000f [ 282.218677][T12783] kvm [12782]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc2 data 0x4d00000000f [ 282.238199][T12783] kvm [12782]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc2 data 0x4d00000000f 12:46:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x106}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x240000, 0x0) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000240)=0xe80c) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0xae, "9247c2ea823021fa1e7d08b6a28fc621ea3968a05878bc3bbb7ef133b5346af3f1128ea2cd3e9da126417f9ef760e4cdd22f1cf71770c3fe5014612b576e94e9c885c890158692ed62b3e1393dfed2c204bec4077935d87b8a17db106ef25dd3c4c2cf51d7f29419cb7e24bdba4bd83ae7df0f34fd917c379290386f056886b723bf16bf0d6026332a340d8ddf4ef66aaa8de3940ca6982d9a9c41843188c23c981d5809aa32b98e4bea20c9e8b0"}, &(0x7f0000000280)=0xf1) [ 282.649122][T12789] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 282.725073][T12789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 282.736342][T12789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 12:46:37 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000000)=0x41) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000040)) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000b70200000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"/256]) 12:46:37 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r4, r4}, &(0x7f00000002c0)=""/83, 0xfffffffffffffcd0, 0x0) r5 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r5, r5, r5}, &(0x7f00000002c0)=""/83, 0xfffffffffffffcd0, 0x0) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000040)=[{&(0x7f0000000180)="dc1b212729ae984a465632362343707241e698b259df9ee4a1d07b3f93ec853cf390fe7e76ab40cacd2173b2ccb07f806486b0625e9b3769e86bed7bf9929046829251d31a42d43c5a320391e76fe00dc7fe0bc7fa507b2eaee1379eac9d16a64087e459d1cfa81968130a4202f017fb060927da2bc29eccca10fe90a76b299320747a52788c33343804e5905a1a", 0x8e}, {&(0x7f00000000c0)="4af7ff21ee53a711ef758fdb59b021e06bb0e810c5d4b4cdba704923ed9a058b3964bab9db2addc488cad1814e721e092e755cc252503b68a107b2612de567c8444b5aca822e642a9089c03ac21d77cf92a179923a5ac79c697146ec724def8db7701ddbb296534045c2f3930477f94df8e8b2a1d8ad45c048", 0x79}, {&(0x7f0000000240)="b68b93ccc62abe17ee10f12743a77f8fa9838d3463f4fb6d6bd08e18338eba09c80d5a7489d3a80d2299ca3e23b4a77d26e495c8598d688f94c1ce6292a57a99a0dc72af09f26527d924619532f497f6e172f258e559e435ae2b8497d3c03382265334c7d255526815f1272288b75e52ad6eb67b4215309c50d1b2788b0aa1fa72cc0ce811f12ad2a263974462876f8966f97abc5d09770e7f1939f8e9af22091ca3f38d4638e44864e9e228b531a515f7def06a792de7402ed4abffc7fb4f8a6b71ebbb9e44ed728d5fe561c542620f1c919a6f069c21dc753165bff6eb3accbb5e6897400a393bd14d05457eefc2b73d3be096a29f", 0xf6}, {&(0x7f0000000340)="da188b4f00ae27ff22acc453857ee61fc5200c0ef9ddab0870937d05cb85efd98489328d93f3d5f033bd03813e8d95b55bfb0b32b35fd837769133049ac96e813a84b6d08de312c46719dcaa6907a64d80", 0x51}], 0x4, r5) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) 12:46:37 executing program 2: msgget$private(0x0, 0x219) r0 = msgget(0x3, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10042, 0x2) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000040)=""/224) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x107881, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000180), 0x4) msgrcv(r0, &(0x7f00000001c0)={0x0, ""/125}, 0x85, 0x1, 0x3000) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x4080, 0x0) ioctl$TCFLSH(r3, 0x540b, 0x2) r4 = open(&(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x20) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000300)={0x0, {0x2, 0x4e20, @remote}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e24, @empty}, 0x250, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20, 0xfffffffffffffff8, 0x1}) clone(0x8000, &(0x7f0000000380)="6f48ebc7dd0a70a1d5fc129ff3ddae778988a2bb115fc16315120f728a3acba12c9d42ed99cbe8c6ebfadfc19eaeeae64f9be3c822035e813c19a91f4379ee83df455adb57274cee4beba376efd044023400345fb350d1a7336da6fc75d377b51396502c7cc663a85cf9848ce4bde9c9d3fe233331226ccb69f3de0b3154c7511127047b3cbbe3a4cf00ff43ba2af741f16851f596e59a8fb4793922391eaa04b6f33432a635ddaef9666b265fa4313d4090e5dfa2a1e9aaefddb0e1117c699a30bb924e93d9b049fc679d40ad0b91eaf6c4fd58ffd0623a92d0fcfef6b7e6ab8d", &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="6db202a9b3060cc4f47c52ded04d495f0dfed2eab5d70d4a831e") r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000000540)={'bond_slave_1\x00', {0x2, 0x4e22, @local}}) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0x101000, 0x0) r7 = getuid() fsetxattr$security_capability(r6, &(0x7f00000005c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x8, 0x1ff}, {0x800, 0x10000}], r7}, 0x18, 0x6e5c9c3ac5b081ab) r8 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_SIOCGIFCONF(r8, 0x8912, &(0x7f0000000740)=@buf={0xc5, &(0x7f0000000640)="28f1d80c7b3a7cc0752e5ba7fa1e7a11e7bf8279936a9fad9a7b85a35e686b6de53bd7246a8cd8d8acfaa9981650519bd4109bb84da8d91bab6a20c85ac618c6ce0ee148e4b561d6b230673a63d1d424005ed966b1e4eaf520f7f2f2904890c50641f53944d5dfe49b150c41f2058b26243f04f16c9c5044677864d8f8ac311ce4af578a733ebf6afce050e52ae28640f3690d4a37e01fa5d674d8f447deeacdf1578bc9284dfa436de21f9dc38797000b81837be6a9d64c30eafcb8454f5980014f081d75"}) statfs(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=""/87) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000840)='/dev/video2\x00', 0x2, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_GET_RESERVED_SIZE(r9, 0x2272, &(0x7f00000008c0)) ioctl$VIDIOC_G_AUDOUT(r9, 0x80345631, &(0x7f0000000900)) gettid() r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000980)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x24, r10, 0x4, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) r11 = openat$null(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/null\x00', 0x401, 0x0) ioctl$SG_SET_COMMAND_Q(r11, 0x2271, &(0x7f0000000ac0)) 12:46:37 executing program 0: r0 = socket(0x640e0d3abdd705c9, 0xa, 0x1) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x4}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0414f9f4070009f4ff80000000000000000000000004001e0040000000", 0x1f4) 12:46:38 executing program 0: sysinfo(&(0x7f0000000000)=""/22) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x44200) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x4000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x852200, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000001580)=[{0x0}, {&(0x7f0000001680)=""/4096, 0x1000}, {0x0}], 0x3, &(0x7f0000001600)=""/15, 0xf}, 0x20) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\xff\xff', @ifru_flags}) 12:46:38 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e05004e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000140)="53000000c90dca800437f401000000040000076206aa000000800000e0cd12a23086f8fddb644d8d37b4a77277080c260ad8879c6bebbca947a9473df9e143f8aa68a111eaffbc50f58e84ec81d03e73483bff24a64ce584444d7f8632a342a093d366d2f8d6374b3a511a6476676e217eff383a25bdbfedc78e6f73731f8bbf6d88e7012b8d7f6f90cd20c009f1dc73962f0f19afd9c40809", 0x99}], 0x2) 12:46:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000780)=""/61, 0x3d}], 0x1000000000000290}}], 0x55ec2b207cf7f931, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000005900)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000040)=""/168, 0xa8}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfe22, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x378}, {&(0x7f0000000fc0)=""/4096, 0x49d}, {&(0x7f0000000400)=""/120, 0x2ce}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xfffffffffffffe0d}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) [ 284.315661][T12813] IPVS: ftp: loaded support on port[0] = 21 [ 284.518578][T12813] chnl_net:caif_netlink_parms(): no params data found 12:46:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) select(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r3, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000)=0x1da9, 0x4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) [ 284.590919][T12813] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.598660][T12813] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.607626][T12813] device bridge_slave_0 entered promiscuous mode [ 284.619811][T12813] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.627393][T12813] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.636222][T12813] device bridge_slave_1 entered promiscuous mode [ 284.673007][T12813] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 284.687051][T12813] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 284.723183][T12813] team0: Port device team_slave_0 added [ 284.735331][T12813] team0: Port device team_slave_1 added [ 284.826314][T12813] device hsr_slave_0 entered promiscuous mode [ 284.872252][T12813] device hsr_slave_1 entered promiscuous mode [ 284.911649][T12813] debugfs: Directory 'hsr0' with parent '/' already present! [ 285.123685][T12813] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 285.243038][T12813] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 285.287470][T12813] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 285.330888][T12813] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 285.436490][T12813] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.443767][T12813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.451659][T12813] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.458861][T12813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.515352][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.546128][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.690016][T12813] 8021q: adding VLAN 0 to HW filter on device bond0 12:46:39 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x57f734d39e2698b1, 0x0, &(0x7f0000000080)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc74b207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 285.750126][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.759229][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.777928][T12813] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.829209][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.839125][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.848241][ T3380] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.855494][ T3380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.863977][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.873440][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.882632][ T3380] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.889792][ T3380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.984011][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 285.994161][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 286.004220][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 286.014858][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 286.024441][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 286.034198][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 286.074903][T12813] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 286.086455][T12813] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 286.145907][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 286.154866][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 286.164194][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.174201][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 286.183457][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.249407][T12813] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 286.283641][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 286.292312][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 286.299981][ T3380] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 12:46:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r3 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)={r4, 0x0, 0x0, "b1"}, 0x200000c9) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x4, 0xffff, 0x0, 0x9c, 0x1000, 0xffffffff, 0x1, 0x3, r4}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000b40)={r4, 0xfffffffb}, &(0x7f0000000b80)=0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000b00)=r5) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000240)={'ip6_vti0\x00', 0x9200}) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r9 = getpid() write$cgroup_pid(r8, &(0x7f0000000200)=r9, 0x12) tkill(r9, 0x38) r10 = creat(&(0x7f0000000140)='./file0\x00', 0x20) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r10, 0x111, 0x3, 0x0, 0x4) r11 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x121800, 0x0) r12 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000100), 0x1, 0x0) r13 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDFONTOP_COPY(r13, 0x4b72, &(0x7f00000000c0)={0x3, 0x0, 0x0, 0xf, 0x1fa, &(0x7f0000000700)}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r12, 0x0) ioctl$TUNSETOFFLOAD(r12, 0x400454d0, 0x7) ioctl$PIO_FONTX(r11, 0x4b6c, &(0x7f0000000040)={0xd, 0x14, &(0x7f0000000300)="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"}) 12:46:40 executing program 0: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/dev\x00') sendfile(r1, r2, 0x0, 0x100000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000080)={0x200, 0x6, 0x4, 0x100, {}, {0x4, 0x1, 0x0, 0x55, 0x2, 0x1, "7c23ba2d"}, 0xe7, 0x0, @offset=0x1, 0x4}) 12:46:40 executing program 2: ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0320a600c7f646f55456f73b4f126e359f6f62e02ccae4cc23d2e0a608000000000000000000006c51cfea1c4a90097fad17fe9f2cc20299c34c74599784a8a6cf7681b7a29f88efa6ff7f8a62673e04f4873c086d9d2016fb9639472212b59ae8fb0adc97e8852fdafa61454fd6b4d5674c0000007a1264add324c6136cd0b5e80ad1"]) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x80001, 0x0) write(r0, &(0x7f0000000000)="bc", 0x337) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0xfffffffd}) 12:46:41 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000)=0x3, 0x4) getsockopt$inet6_mreq(r0, 0x29, 0x4, &(0x7f0000000200)={@empty, 0x0}, &(0x7f0000000240)=0x14) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0xffffffffffffffba, &(0x7f0000000080)={&(0x7f00000003c0)=@newlink={0x28, 0x10, 0x705, 0x0, 0x8, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) 12:46:41 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="fe36dfed75502bf5e8d80c280c4865d83b675b1326a0c0db68d5a4058b95c91f4d1ba5ebf81f007e69875583846e3e5f6e3d8eff2e981caf07f09c2c17d1fc4ea5981369a5b23e0e343cb0fd79e6645685fc6512ec45cd1bce4d8997117b20e1aa4d96f2d30917bf017eca6aaa4766967bd02e6b52df14479c8c1eafadb2b6686e5068106dfbabc79278d7a2ce1c3c46cbbc91130f849525"], 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0x18, &(0x7f0000000080)=@assoc_value={r3}, 0x8) 12:46:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e24, @local}], 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f00000000c0)={0x3, 0x5}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e22, @dev}], 0x30) 12:46:41 executing program 2: socketpair$unix(0x1, 0x400000003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x7ff, &(0x7f0000000340)=0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000100)=0x5d1, 0x4) close(r0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x5, @loopback, 0x80000000}, @in6={0xa, 0x4e20, 0x9, @remote, 0x7fff}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e23, 0x6, @ipv4={[], [], @remote}, 0xa957}, @in6={0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x1d}, 0x10000}], 0x80) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x101481, 0x0) io_submit(r1, 0x20000000000002f6, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 12:46:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0xe326a787, 0xff, 0x8, 0x0, 0x91c9}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'veth1Tto_bond\x00', 0x3802}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x40000, 0x0) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x3) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x9ce4cca802a9b0d5) 12:46:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r3, 0xc0285629, &(0x7f00000004c0)={0x0, 0xfffffff9, 0x9, [], &(0x7f0000000480)=0x2}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000000400)={0x16, 0x10001, 0x7, 0xfe, &(0x7f0000000140)=""/254, 0xc3, &(0x7f0000000240)=""/195, 0x91, &(0x7f0000000340)=""/145}) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000000)=0x3) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x144a80, 0x0) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/attr/current\x00', 0x2, 0x0) lseek(r4, 0x8, 0x2) 12:46:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000268ad35047c750138436f5f8fab3540000000000000000000000d4000400000000001500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:46:42 executing program 0: r0 = socket(0x200000000000000, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xe}}) 12:46:42 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r1 = socket(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x15000000000000, 0x485, 0x6, 0x0) 12:46:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8, 0x309040) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) getuid() pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x3}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 12:46:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) r0 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x10000, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002580)={0x1c, r2, 0x1ef6325be532a5eb, 0x0, 0x0, {}, [@FOU_ATTR_IPPROTO={0x8}]}, 0x1c}}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000440)=0xe8) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}]}, 0x30}}, 0x81) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x80000, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="850000002e00000084000000000000009500000000000000b52c1c1c5054c25b0b591aeabfc8e033c94ab0ac6a79320483274b0b30d1801e0400695a3abbe2e46ffeb05f0ab3d316fb4502fe1b04ab276ba2b3b3a45de07bacf4e8fd695c8d283c8afb00006da874fba544fbc60fdb4e2d043495e6918e0677e439a60c0f7be34b8603858198f35dcc36e5a458a428201a994b83272deaf3b7b40d1450f06b45a9c0cb07803c5d094c21ba36d38aad841d30452809eda5107623cd63950a225dac129699179a62c31f32ff30295757b3d7be9e35511bcdf298c266c888382f5ca0001634e8f5e214c13a5fbd9efc8a1d473cc9c77c1b92cf92663e170b49a1b76233da015975e4e90f903d0b61c0452b0a1fd333188c3925e8a99595e9def9426859ebbbb4b00b4c637dd0a0400f944884121fb6c80c28dcce004bde8cef498a9d86687d888a2621c53f1b4c7062cf143d1ec0a3fcd93ed6bd91114f9227a9a6ddcc72f1218a234109cf409493a046a966a9080f085c325b3b7b03f0737e4fdc0c81cfc78e7cf04d0603b6551868599436164489ec7d284d3b972c6a9cb9b27774971495990cb2430a4ba772537a161761dff1a9fa61573a624954dba3248cbce9cbd8a1114597ee76d200001ff8f36fce0000d007945132246ff17935c1820cff768d6df95d72010463baeb9ea8cdb231364aafdc4548a2652c78c6e1e0f0d02db35f3c68f748e98bad56f7f86412f69ea369ac88c598971fdaefb0e6ec45a12a2afe33bd8671528d231db22e6f94e1dd496ba71ad2d56b9669b6b38c1e13d9b1809f9c19fd411d5a863c00f07604e02c0ec2f9e2779c4ad983199283e6d0d917ec62988ba994496680166eeef602a8d7193ea316d2ef7519ede7071bb26367e3aadbc23aab4a45b434252690caaf027bfdc8cd2249bb4eb1be4a3ff9b203a355"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffbd}, 0x48) r8 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000040)=r7, 0x4) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@deltaction={0x14, 0x31, 0x11}, 0xdc}}, 0x0) sendmsg(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f61050002008100fd038b0502000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 288.472947][T12907] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 12:46:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lseek(r2, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)={r3, 0x0, 0x0, "b1"}, 0x200000c9) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=r3, @ANYBLOB="b3000000fe020000000000000034e300278388f2a1816605787304f9ace25900731051e1dc23fc135fb60af25b7e1b1d991dd1c58f951669b1937b868370c83400209692cb2054f7de88c9aad9b4431390e65a3d72a95fc7268641edd4f214b7d6e9b0010938b0209d51171ab14987c04f5d93c7e31d0461abaae1c273d283d40b47f46593edeaaab401ca1c446100"/156], &(0x7f00000000c0)=0x2) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={r3, @in={{0x2, 0x4e22, @broadcast}}}, &(0x7f00000001c0)=0x84) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = eventfd(0x9) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r8, 0x0) ioctl$IMDELTIMER(r8, 0x80044941, &(0x7f0000000080)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)={r5, 0x100003f}) [ 288.543613][T12907] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 288.839094][T12915] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 12:46:43 executing program 0: io_setup(0x2, &(0x7f0000000180)=0x0) r1 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) pwrite64(r1, &(0x7f0000000080)="44b2350ee6457565f72a5cc2ae07072a7364bbc1624f639e61b19e678880ba10c1fe2c", 0x23, 0x40) io_submit(r0, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[]}, 0x1, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x10, 0x3, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r7, 0x0) r8 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lseek(r8, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)={r9, 0x0, 0x0, "b1"}, 0x200000c9) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r8, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=r9, @ANYBLOB="b3000000fe020000000000000034e300278388f2a1816605787304f9ace25900731051e1dc23fc135fb60af25b7e1b1d991dd1c58f951669b1937b868370c83400209692cb2054f7de88c9aad9b4431390e65a3d72a95fc7268641edd4f214b7d6e9b0010938b0209d51171ab14987c04f5d93c7e31d0461abaae1c273d283d40b47f46593edeaaab401ca1c446100"/156], &(0x7f00000000c0)=0x2) getsockopt$inet_sctp_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r9, 0x7}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f00000002c0)={r10, 0x40}, &(0x7f0000000300)=0x8) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7fe}, 0x10) sendmmsg$alg(r5, &(0x7f0000000140), 0x4924b68, 0x0) [ 288.885434][T12915] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:46:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffdac) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x57, 0x73, 0x9, 0xc5ef, 0x3, 0x3e, 0x1, 0x399, 0x38, 0x10a, 0x3, 0xfff9, 0x20, 0x1, 0xff8b, 0x3ff, 0x8}, [{0x6, 0x7ff, 0x8, 0xe951, 0x80, 0x7650, 0x5, 0x7}], "6b53b33003fc41aa56bc07b1664ed3def3a476ae6821b650f738336022a305fdaf709ffb63ac48225b1bbd899f04ccc7458167637c023ac2cc4c36431d0ab29a6855a43456705d362735b8e7619017473b68557a455898c28e6d97bf60e52aa13c15804e7ccc6880e373df7f84454cfbe50f8414d2cfb5bc8c0e22b224083bca262881fb92a17192b1ffba6677ea1171eefb52b245f6a3c886615571c40db91645fb3edeab70e38b5186c0fe48b594f013c6475b8c3585614f8f126c0a3523ba4819269834541b66d97a64a5a67ca74c92a0a6c3ae12668e957c5a9524d928f2e08aefdcad322e3a7f61c5ca", [[], [], []]}, 0x444) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r5, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r8 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r7, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r6, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) ioctl$EXT4_IOC_SWAP_BOOT(r8, 0x6611) r9 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:46:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x20040) ioctl$SNDCTL_DSP_SYNC(r1, 0x5001, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) mmap$binder(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') 12:46:43 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000002000)='.', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffffff, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00') 12:46:43 executing program 0: syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x1, 0x2) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x80200, 0x0) r1 = semget$private(0x0, 0x4, 0x221) semctl$SEM_INFO(r1, 0x3, 0x13, &(0x7f00000004c0)=""/4096) io_submit(0x0, 0x3, &(0x7f0000000200)=[&(0x7f00000001c0)={0x0, 0x0, 0x8, 0x0, 0x0, r0, &(0x7f0000000400)="00cc36b91429cb7e11157cb82dfbe2e0bae3b225530508eaf76b0a97a6ffe366ce203c3d97166d910304b07bc286183f887094ebc847731f5088a8700347e82a9f1fa93142b0bea9487c017477e8d1f45787bbbb07fde95624cd93f147b25e3b31340317d8e2e1ad83336f7480ba76164a2f8afe2a3cad1aa79fd2fb3866ba7bf3dcde5f792ab560610a54da06e0d52c29abadc9bb5b19f28afb5947a7eeea0e9bbc60d831687a744a", 0xfffffdbe, 0x0, 0x0, 0x6}]) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x20, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in6=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) rmdir(&(0x7f0000000000)='./file0\x00') 12:46:43 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x4}, 0xffffffffffffff61) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000a40)=@gcm_128={{0x303}, "06000000fffd00", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "592d1092ce6581aa"}, 0x28) 12:46:43 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000280)=""/220, 0x6}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r4 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r3, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r2, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYRESHEX=r2, @ANYRES16], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 12:46:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) r4 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r4, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="740000002400f3a4748635e300db000000040000", @ANYRES32=r3, @ANYRES16=r4], 0x3}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000100)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f00000007c0)=[@assoc={0x18, 0x117, 0x4, 0x5}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xa0, 0x117, 0x2, 0x8c, "60f1ef0b70e48ad6e88517bd469190f819174bb7d218b593fc9684a32629e20450a166daaabc53acbed9ec0cd74197f2cfeddae05c0999fdc3394f6f296a3d1b002b25c35dbc3cd941274ab18d3e01b11b2f1a526b286d53a591272652f3fea24e858bd24f4334e93d33fea6b63b009bde620ed955619d83be0a05c8116d349623fa33f9d3068bffa6984faf"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x10000}], 0x118, 0x24014002}], 0x1, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x347ea43dae8c70fc}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newrule={0x28, 0x20, 0x10, 0x70bd2a, 0x25dfdbfe, {0x2, 0x20, 0x14, 0x7f, 0x2, 0x0, 0x0, 0x3, 0xa}, [@FRA_SRC={0xfffffffffffffeee, 0x2, @remote}]}, 0x28}, 0x1, 0x0, 0x0, 0x4090}, 0x800) 12:46:44 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="f00000001a00815b0000000000000000fe8000000000000000000000000000aa000000000000000000000000000000010000000000000000020000b000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="7f0000010000000000000000000000000000000000000000ac1e0001000000000000000000000000000000000000f1ffffff0000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d767d78aca465aa20000000000000000000000000000000000000000000a00"/168], 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 12:46:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x3f}]}}}]}, 0x3c}}, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r2, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r6 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r5, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r4, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) io_setup(0x2, &(0x7f0000000180)=0x0) r8 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r7, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x2}]) ioctl$void(r8, 0xf282d5e2f801a55b) [ 290.063970][T12958] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 290.078058][T12958] device bridge1 entered promiscuous mode 12:46:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000040)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2000, &(0x7f0000000340)=ANY=[@ANYBLOB="6664d5", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,max_read=0x00000000ffffffff,\x00']) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 12:46:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200000005, 0x0) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x100000000, 0x80000) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000040)={0x1000, 0x0, 0x1, 0x3}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f0000000080)={0x4, r5}) ioctl$int_in(r2, 0x800000800c5012, &(0x7f0000000200)) 12:46:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) read$midi(r4, &(0x7f0000000100)=""/117, 0x75) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 12:46:44 executing program 1: r0 = memfd_create(&(0x7f0000000000)='sessionid\x00', 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r3 = getpid() write$cgroup_pid(r2, &(0x7f0000000200)=r3, 0x3a6) r4 = getpgid(r3) fcntl$lock(r0, 0x26, &(0x7f0000000040)={0x0, 0x2, 0x1ff, 0x94, r4}) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x4000ae172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r7 = getpid() write$cgroup_pid(r6, &(0x7f0000000200)=r7, 0x12) r8 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) r9 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000240)=ANY=[@ANYRES32=r10, @ANYBLOB="000100297c8f558160fd1e9e92ac1187ce2f762aa224d48c8eef0287bbfce0ac229b52e9372622e0eebb28c26bd4bb329356280585466f68a79f0c86778a220ea085b108d828c065d5dab6e5367ca8df5260edca099c4678437246c331e9266681776a34e304aa615dc799b88cade9597420673e8ba2b3eb3e4a"], 0x200000c9) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x4, 0xffff, 0x0, 0x9c, 0x1000, 0xffffffff, 0x1, 0x3, r10}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f0000000100)={r10, 0x3}, &(0x7f0000000140)=0x8) syz_open_procfs(r4, &(0x7f0000000080)='attr/keycreate\x00') 12:46:44 executing program 0: set_mempolicy(0x4003, &(0x7f0000000140)=0x101, 0x2) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)='\x00', 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r7) r8 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r10 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r9) r11 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r12 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r11) r13 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r12) r14 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r13) r15 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r14) r16 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r15) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r16) keyctl$unlink(0x9, r10, r16) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000040)={'\x00', 0x0}, 0x0, 0x0, r10) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'\x00', 0x0}, 0x0, 0x0, 0x0) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 12:46:44 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="6748e5d61e680fc0dc25927317d5deb0", 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="27ba4804f31451311f85135900a6a513", 0x10) close(r0) 12:46:45 executing program 2: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x1}, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="da5700000012c97c7694513f6c1000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200100001006970366772657461700000001400020008000200000000000800030000000000"], 0x48}}, 0x0) [ 290.976499][T12984] IPVS: ftp: loaded support on port[0] = 21 12:46:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x80801, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000240)=0xffd, 0x4) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r1, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) 12:46:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)=',!\x00', 0x0) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r4, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) sendfile(r4, r1, 0x0, 0x80003) 12:46:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800220000000000"], 0x3}, 0x1, 0x0, 0x0, 0x8048400}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32=r5, @ANYBLOB="ac2c000000000000000000000c0080eb8600000075700000200002001c00020005000000ff030000000000006600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792afb8d7931d512f9e6dfafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d"], 0x50}}, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) [ 291.230375][T12991] IPVS: ftp: loaded support on port[0] = 21 12:46:45 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x1d5, &(0x7f0000000040)}, 0x20064401) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x202006, 0x4) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$xdp(0x2c, 0x3, 0x0) sendmmsg(r1, &(0x7f0000000100), 0x5bd, 0x2400ffe0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) pwrite64(r1, &(0x7f00000000c0)="707f5135fc88c0cf9b412b1e39091d435afd0aa75b8db816c570f60915913f2fc1c54e8a1e05031a3d2cd9a96dbafeb387dcfa7612c6bbe9b7efd77d96560e52fd51624cd5e2ffabfbc99c7674", 0x4d, 0xffffffffffff7fff) 12:46:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) quotactl(0x201080000102, 0x0, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000014385b69000000000000000000ff7f00000500000020000000000000007f060000000000000009000000000000000000000000000000000000000000000000000000000000009dc8000000000000000100000000000003000000000000000300000000000000000000000000000000000000000000000000000000000600"/320]) 12:46:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00-\x00\a\x00'/20, @ANYRES32=r3, @ANYBLOB="ecff120003000e00000000de"], 0x24}}, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r4, 0x0) openat(r4, &(0x7f0000000140)='./file0\x00', 0x10043, 0x8) 12:46:45 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r2, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) getsockopt$packet_int(r0, 0x107, 0x8, 0x0, &(0x7f0000000080)=0x4684dde7b35dcc8f) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r3}) r5 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r5, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r9 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r8, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r7, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x5, 0x8}, 0xc) r11 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r11, 0x0) r12 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r12, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)={r13, 0x0, 0x0, "b1"}, 0x200000c9) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x4, 0xffff, 0x0, 0x9c, 0x1000, 0xffffffff, 0x1, 0x3, r13}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000780)=ANY=[@ANYRES32=r13, @ANYBLOB="bc0000006084ffeca8add7723bbe0400000000000000adddfb63b0859c6a58f7165c18116273a410985c9c6940245d7f32d091649006df6980e424d2f682df53030020a9ee10c79b554de7e6d458d4faa68022dcaa2f2f3eeae90dc378ccb5ac235c5b15df0601abf23668f7ed056ce85bcc645a6e63eb88f5695bd5166fa6c9c4a1bb9ca4c92a90b2d4e7e3b08adaf51afc584b1b0ce5bf15a761d58e6aa01c8c2ea49556f34c35e586ba18610cd984db9f24742f363115235a86491fb6e5d854f761d28a62a11da8f1009413370101f44cd23facdd23a92ec125fed503321419911bb2a063ab1d5327b040f1a098b3aa0faf2ce0d95a5389e0e0248a6029b91f77d077400093e784c58c20015694509f227b81c504278c94658419761595a0c30a449209925ec2de0a23e6909c7e9030770af6c1c61dcd68673c1028c459e1be5aba83089b18f0556fc45303e10c53d36547d944e1571fe889bd9ded4b6a0fa701bae7311387086ea19f25ed2dcfe2efe437ddc0c8240e77839d039fd5f8065a313630123f26b86b35516d8d80a186c71f0d5e82ccbdb09d431296cfca1d17951d5ef35a7596d37139d182bb202eb6220418e64e037d9a15547393815bab9a49331e92dd8ffb45eebfa29e6c6faa984011ae46e05437bdf1aa59e478d2a71886c0c3df17"], &(0x7f0000000100)=0xc4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r11, 0x84, 0x18, &(0x7f0000000140)={r14, 0x2}, &(0x7f0000000340)=0x8) r15 = dup3(r7, r10, 0xc0000) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$TCSETS(r17, 0x40045431, &(0x7f00005befdc)={0x0, 0x2, 0x0, 0x20000000, 0x6, 0x0, 0x8, 0x4}) r18 = syz_open_pts(r16, 0x0) ioctl$TIOCSETD(r18, 0x5423, &(0x7f0000000080)=0x3) r19 = socket$key(0xf, 0x3, 0x2) dup3(r19, r18, 0x0) dup3(r18, r16, 0x0) 12:46:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400, 0x0) 12:46:45 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') splice(r1, &(0x7f0000000180)=0xfffffffffffffff9, r0, &(0x7f00000001c0)=0x2, 0x6, 0xd) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r2, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x810, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x1, 'tunl0\x00', {}, 0x13}) r6 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x5, 0x458c00) write(r6, &(0x7f0000000100)="2cbf14394620a6cfc9fc0a36fba80b33fb23a63587e997ef4f0198bc5343ac46fced7c2cc48d2e0b37642abbb6449d80ceb75a7a63ba385ad7a578e8c63c3b7872b549e8ee1dc81673faec1961c747e64eb5efa550b24f7c6cfb36f76c6ba7d7e2e2a39c21ae0c24bcf325c81b6f1293dab6", 0x72) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xf) sendfile(r0, r1, 0x0, 0x320f) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r7, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r7, 0x54a1) 12:46:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000200)=r2, 0x12) clone3(&(0x7f0000001300)={0x2230400, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), 0x22, 0x0, &(0x7f00000001c0)=""/205, 0xcd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=[r2], 0x1}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000, 0x3}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x4000}, 0x0, 0xffffffffffdfffff, 0xffffffffffffffff, 0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="5000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="000000010000000008000a00", @ANYRES32=0x6, @ANYBLOB="120012000c0001007665746800000000180002000a00010002000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x50}}, 0x0) [ 291.979530][T13039] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 291.990509][T13039] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. 12:46:46 executing program 3: ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000000)='-\x00') r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200002, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x80400, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x1f, 0x7, 0x5, 0x1, 0x0, 0xe, 0x400, 0xe9cc5acf7ae85ee5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x73, 0x1, @perf_bp={&(0x7f00000000c0), 0x4}, 0x20420, 0x6, 0xffffffff, 0x8, 0x5, 0x9d2, 0x20}, 0x0, 0x3, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r1}) write$nbd(r3, &(0x7f0000000240)={0x67446698, 0x1, 0x3, 0x2, 0x1}, 0x10) connect$netlink(r3, &(0x7f0000000280)=@proc={0x10, 0x0, 0x25dfdbff, 0xc31cb7064370a41b}, 0xc) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000300)={0x380000, 0x6, 0x9, [], &(0x7f00000002c0)={0x9a0918, 0x7f, [], @ptr=0x3}}) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x7437, @mcast1, 0x1}, {0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0xe}, 0x6}, r5, 0x10001}}, 0x48) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000480)={[0x8, 0x7, 0x1, 0x7, 0x100000000, 0x40, 0x5, 0x7fff, 0x1, 0x2, 0x0, 0x20, 0x100000000, 0x8000, 0x8000, 0x3], 0x100000, 0x280004}) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$PIO_FONTX(r6, 0x4b6c, &(0x7f0000000980)={0x167, 0x1e, &(0x7f0000000580)="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"}) mount(&(0x7f00000009c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)='iso9660\x00', 0x10, &(0x7f0000000a80)='posix_acl_accesssecurityc\x00') ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000ec0), &(0x7f0000000f00)=0x4) r7 = accept$inet(0xffffffffffffffff, &(0x7f0000000f40)={0x2, 0x0, @dev}, &(0x7f0000000f80)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000fc0)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x29}}}}, &(0x7f0000001080)=0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f00000010c0)={r8, 0x16, 0x6}, 0x8) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000001100)) chdir(&(0x7f0000001180)='./file0\x00') ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) r9 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/sequencer2\x00', 0x347c00, 0x0) write$ppp(r9, &(0x7f0000001200)="6db2e6264274f5ad8897e2aa1ca48e7ddc1eb9a7dbcf3f4829e88eb21f1fe5778306f160e9334759a39a916eb6f80c2f86778e0acf3206dd9e16d4a0d724366dbf44d1654d3c055f039d471444ff84d084802b93e775580948912e68e9b39213eb4a08886651a4d8bea0b8479646912b3a73d5885df4a3cf71d9398f6f258f5909196e40e31432110b0597a25b598389c4e81e57dbb20486a1ec02b27c9f9ede9ab6e0e32ee9a4475072cc9a2c9eb14d1ef4fa4e06721d6bb42a605984fafff16b12a6d977df069a5387625ba927aa36d5999600a0d89e1ad1ef2d4355d95436a252e18a6cd14e", 0xe7) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000001300)={0x6, @loopback, 0x4e23, 0x0, 'rr\x00', 0x4, 0x7ff, 0x4d}, 0x2c) r10 = syz_open_dev$vcsa(&(0x7f0000001340)='/dev/vcsa#\x00', 0x2, 0x40000) getsockopt$inet6_mtu(r10, 0x29, 0x17, &(0x7f0000001380), &(0x7f00000013c0)=0x4) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x400000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r11, 0x0, 0x485, 0x0, 0x0) 12:46:46 executing program 2: rt_sigreturn() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x1b0001}, [@ldst={0xffffffbd, 0x0, 0xe, 0x0, 0x0, 0xc}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f00000001c0)=""/195, 0x0, 0x0, [0xff5fff5f], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$packet(0x11, 0x2, 0x300) clock_adjtime(0x2, &(0x7f00000003c0)={0x4d64, 0xbd8, 0x7, 0x7fffffff, 0x8, 0x1, 0x7f, 0x1000, 0x9, 0xfffffffffffffffe, 0x5, 0x6, 0xfeee, 0x57, 0x7, 0x1ff, 0x4, 0x0, 0xfffffffffffffffc, 0x9, 0x0, 0xfffffffffffff6f2, 0x8, 0x8, 0xffffffff, 0x7}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapsh@t\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4ddfa8fc8ffbe44d}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0xa8, r1, 0x3c538436899338e9, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffe01}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x38040c10}, 0x8000001) 12:46:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x79}, [@ldst={0x6, 0x0, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x80000000, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffe}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x11800, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r5 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r4, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r3, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) write$P9_RAUTH(r1, &(0x7f00000000c0)={0x14, 0x67, 0x2, {0x20, 0x2, 0x4}}, 0x14) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) r7 = syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x101, 0x40) epoll_ctl$EPOLL_CTL_DEL(r6, 0x2, r7) 12:46:46 executing program 2: r0 = socket(0xa, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x400000, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0x375) lstat(0x0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r3, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="020000000100c63cbb040000000000000008000400884f5dfec34e", @ANYRES32=r6, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="10000a00000000002000040000000000"], 0x42, 0x1) write$P9_RGETATTR(r1, &(0x7f0000000300)={0xa0, 0x19, 0x2, {0x1000, {0x8, 0x0, 0x6}, 0x20, r2, r5, 0x6, 0x5, 0x5, 0x3, 0x2fa7, 0x5, 0x2, 0x100, 0x3f, 0x3, 0x8001, 0x7, 0x8, 0x10000, 0x2}}, 0xa0) r7 = socket$packet(0x11, 0x3, 0x300) recvfrom(r7, &(0x7f0000000000)=""/243, 0x19610b49, 0x18000, &(0x7f0000000100)=@tipc=@name={0x1e, 0x2, 0x0, {{0x41, 0x1}, 0x2}}, 0x80) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r8, 0x6, 0x15, &(0x7f00000001c0)=0x4, 0x4) recvmmsg(r0, &(0x7f000000a100)=[{{&(0x7f0000009f40)=@can, 0x80, 0x0}}], 0x1, 0x1, 0x0) timerfd_create(0x2, 0x81000) 12:46:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x10, 0x2, [@gre_common_policy=[@IFLA_GRE_ENCAP_TYPE={0x8, 0xe, 0x1}, @IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) [ 292.404194][T13052] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 292.439981][T13056] netlink: 'syz-executor.1': attribute type 14 has an invalid length. 12:46:46 executing program 1: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}, {[@timestamp={0x44, 0x4}]}}, @igmp={0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}}}}}, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000080)=""/205) 12:46:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0xa6997f1562df9326, 0x2}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x30}}, 0x0) r1 = dup2(r0, r0) r2 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={r3, 0x0, 0x1, "b1838f8a6ddd685a08e8099965ed028a5b27da38fbd549a39bbdb9"}, 0x2db) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x4, 0xffff, 0x0, 0x9c, 0x1000, 0xffffffff, 0x1, 0x3, r3}, &(0x7f0000000180)=0x20) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={r3, 0x200}, 0x8) 12:46:46 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/dsp\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x88000, 0x0) ioctl$SOUND_PCM_READ_RATE(r3, 0x80045002, &(0x7f00000000c0)) 12:46:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="d33715530000000024001200140001006272696467655f736c6176650037eecc54dc5d6b0600090000000000"], 0x44}}, 0x0) [ 292.733310][T13064] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 292.783825][T13071] QAT: Invalid ioctl [ 292.812289][T13064] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 292.843389][T13064] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 292.875115][T13076] QAT: Invalid ioctl 12:46:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000500)='cgroup.type\x00', 0x2, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/73, 0x49}], 0x1) [ 292.994656][T13078] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 293.016941][T13079] IPVS: ftp: loaded support on port[0] = 21 [ 293.038564][T13064] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 293.051061][T13064] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 293.058875][T13064] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 293.092064][T13078] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:46:47 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0x76f) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) pwritev(r0, &(0x7f0000001d40)=[{&(0x7f0000000000)="fa", 0x1}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 293.279799][T13079] chnl_net:caif_netlink_parms(): no params data found [ 293.338797][T13079] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.346167][T13079] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.354975][T13079] device bridge_slave_0 entered promiscuous mode [ 293.365121][T13079] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.372449][T13079] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.381274][T13079] device bridge_slave_1 entered promiscuous mode 12:46:47 executing program 0: syz_emit_ethernet(0x82, &(0x7f0000000100)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x10, 0x88, 0x0, @dev, @mcast2, {[@srh={0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, [@rand_addr="6c38c61a64db6ad484b016c747c64608", @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @loopback, @loopback, @mcast1]}], @udp={0x0, 0x0, 0x8, 0x0, [@guehdr={0x0, 0x1, 0x1, 0x0, 0x0, [0x0]}, @guehdr={0x0, 0x0, 0x0, 0x8d, 0x100}, @guehdr={0x0, 0x0, 0x2, 0x4, 0x0, [0x80]}, @guehdr={0x0, 0x1, 0x3, 0x64, 0x100}, @guehdr={0x0, 0x0, 0x1, 0x0, 0x100, [0x80]}]}}}}}}, 0x0) r0 = semget(0x3, 0x1, 0x620) semctl$IPC_RMID(r0, 0x0, 0x0) [ 293.415872][T13079] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 293.453074][T13079] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 293.553760][T13079] team0: Port device team_slave_0 added [ 293.564238][T13079] team0: Port device team_slave_1 added [ 293.767604][T13079] device hsr_slave_0 entered promiscuous mode [ 293.882837][T13079] device hsr_slave_1 entered promiscuous mode [ 294.062776][T13079] debugfs: Directory 'hsr0' with parent '/' already present! [ 294.283695][T13079] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 294.357420][T13079] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 294.388550][T13079] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 294.428233][T13079] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 294.619551][T13079] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.645694][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.654269][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.672068][T13079] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.693174][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 294.702712][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.712565][ T29] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.719734][ T29] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.728217][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 294.737857][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.746945][ T29] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.754156][ T29] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.799093][T13079] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 294.809611][T13079] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 294.842026][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.850799][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 294.861029][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 294.872206][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 294.882012][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 294.891630][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 294.901558][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 294.911079][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 294.920285][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.930012][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 294.939505][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.948714][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.956447][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 295.013154][T13079] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 295.035360][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.044692][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 12:46:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000003c0)=0x1000006, 0x4) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x7fff, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r3, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18, 0x29}], 0x18}], 0x146, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0cb8580b84e69000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700000000000002d2e9f2d9344a00000000000000210000000000000000000000000000000000000000000000000000000000000000000000008d00639a1f958ae7e3f6c6f421e242b0f5ea3a8aa3dedb0d0ebd323bb05861259d5bdb732e34ee6f590953b042cc0a35da83cc59c206db0580"], 0x74}}, 0x0) 12:46:49 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c9130001", 0x1f}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f00000000c0)="2400000058001f03ff07f6f9002304000a04f51108000100030100c1080003", 0x1f) openat$pidfd(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self\x00', 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000001e80)=[{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000200)="abc9f99ac37a536098908a601f04fde9bcc0c8d408fa98f5a41b1e5d8133398cee7f3ac0231af32faa37c78e438802cbb278ee0bb76ae7b30669f51294c2548bc32ecf035a74c2ddc7f610696e9a061e51b34a4d9d80e59234e579208edfa2d74acd8b58d37bf3d38902", 0x6a}, {&(0x7f0000000280)="3b9b9221efd08a30f80c152020f8bf9c9befda3be96f031c2464738121ff946b744aee5e02a322efef5934137bae01c711e89c263338aeb1657d36673be75b6ff58c1e715ea46db6f4df8af421c56903b3a3952ddd9011aa60dd48c7ca20f42058e5bce83b9d87c46b60", 0x6a}, {&(0x7f0000000300)="d3939c1a93b78faffd9fda2a3ccec0830fc6dfee5d3988f94d5c03def7751340bb1e6bc53856ccc653c9ff2f81dffe40dc8124a5220362429bf57e65ac49316e8c549094f25ee5d35e01b5ff18c775aa9b5b21c432d1b2f111b29f66dd5cb2b61da1a2149fb2f88a8ac970faab3eeea9ef596d3393a8f6e1b371bea822d9fc6ed0475e8390d07cab29c18070a2dfa4545ff29f5bf7a658b16881e44d7c129df86162f712a52dbc5ea79620030daa8d44cda2d627e1d89277aafc8e7178086a1365370a2bd88a27da5a5205f3", 0xcc}, {&(0x7f0000000400)="a95c6daf55e63630cc9586c68e39af2fc431f15bec57165d29a3425c9ce6253d61f338c2be8b124ebf32bfba5c12ddfe407d41bfdd3c11ee2f2acc973ab421aaf911e1d0c44095ce827f7a5ca020bd82d182553f883cd1105550830d42f7826f166f0bfa9a75ffe2e60272b1d3bd12898ab5277387f4a55165b3f42b261e417cffe1da2ad74e1dd8f56378bdc3deb7db6f92dd04c2b96362d1ea99e965891baea3e39520f46fe18725041e8979091740f0bac5e1749d3e72f07c77ec1208bb6987cfef4c5b6c4d", 0xc7}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="14e633cb5a3240c4bac7b5b9cf961843fed623a58775e50b373b4f1cee62e03b32a9299846a5b31e318a526f4cfed9ad77600b5f8cdc85f58389e6f4bd15914e36ed68f4aa083d23b8864b4bbfa85b0e33c47480c28587fcc7af2132955cad286b5ff6b247c418f8278308317479b824", 0x70}], 0x6, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0xa8, 0x117, 0x2, 0x94, "93812f0504999fdbc90e63f90032c4dfdf6532e3ebecda1959cb8e9caa923ba5703ead834cac63085ed7171b78cf644ee010b1c1285e610e75966423135a42cd873977f995d2ac98601bc537c04d2a7116881af11fe5a4ccedec714158749b3b9753116dc6be7f2e2d43a897bf576426c5c2e02f14954ba741a9a019bbd853ebfc912688dd03a285589381e2d7af2a1d42c89bb9"}], 0xc0, 0x80}, {0x0, 0x0, &(0x7f0000001900)=[{&(0x7f00000016c0)="41424612c0534cef8b95d9f19bfa", 0xe}, {&(0x7f0000001700)="114bdf6a4150b7114b4577478ebe5b506f2665faffeac594cd0601c38359e761ab948300e11a838059d7a4ecde59456e44a5db3ce9d621672475e2bc9f2ebe1bbf6a11d92c7a25f7", 0x48}, {&(0x7f0000001780)="fbaebc5d97f82f045c8b1d74bfa505a4c994e807adc2e1c548b6464f626f6f3c3c63f516470ff2c17cd48598304ad5eddd4b20b80f578f9fd4012b30fd5ced11382d4a5ab0ab09e177b6a9b593b5d1b54db02c4fd827c4", 0x57}, {&(0x7f0000001800)="f7e2d1840611880bd192b6aac433ac8f07cec6bcf393b3ce20069f22d9c831baf3b994c3afb51fc289d7780c6aabce2372cb7a0108ab95adec8ca1f66305825cb7cf2cbda472b586c38364880c8e1afa209b8e41a4daf64c3500989d03cd66f5317611226994787fe060df7cf1a02d69a3eda39b3d8ee85b75f226aba2662ab4c69f7f64641e45c25a7c8ce9207a8e381c6aa06fbcb8df1f8783deb4ea59f96e732891b3224e9034ff391ea7", 0xac}, {&(0x7f00000018c0)="5cb66119b426fb", 0xfffffffffffffe42}], 0x5, &(0x7f0000001980)=[@assoc={0x18, 0x117, 0x4, 0x1ff}, @assoc={0x18, 0x117, 0x4, 0x2}], 0x30}, {0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f00000019c0)="c10f656782f8cb1d65a8c2ecc98fd40bbaa3578dcaa4c48d127c712217b6b309fa1a447194e9fefbbdce18d396cf03acf6c7d16c415caf902d494a88e46ca9f3629f4697be9b93690a883d9571950ff716977ce2e71f8881305e615bac0f61864c7e6657c1f29bc6d0", 0x69}, {&(0x7f0000001a40)="25581d1c6df681d3daf0986ccea9072f5a2930dbff172f64678cd86aaa76d4eef47b10268039dfc4687c2e151b4fc1d13b30f0153a2cb4b0a43e65122b38d74587a43ed2cf41feee95e445dda8a434c9dd233cc8ef08b86825d7f7e6011c71849aceb2bc34cfb39f7251fb3eaddf2dc9c524c7aaac465dfebd6aa5be496c5e474b698706315813c8ad5f2c6d8a648dec9478a7fa6c12daa636c78111e40ce3b9081df3494adc93e6c15a9db7fbbfee31306e6a10f490c5beb23f86802c403a8ce281c88c36753f3b82ff41faa97a2bb0cbc6d46037133b9112470178241551f74ac631f1a9a8efa9062dd8cfcc", 0xed}, {&(0x7f0000001b40)="a464568bcb9c30ac2cbd0d66cc511670b33cae358877ae64b3ae04d3f31af242992e3995d216ac1588aca6e61dfaf9e0561e86cb88f6fa00e96d9e61767b088a98b9aebdb68707a6815b10e2e43b5660f314f922cf2de5487453f484d4b50f4f52f1500cf6420d79f09d90da8b9430d5bf4129bf25a7d7e426ca49ad6dc5a0d60da65dccb6", 0x85}, {&(0x7f0000001c00)="e1162cf28be3dfc566c9f12da0debc6e2027fe1d3e29cd3dc33d09b470d445b763eaee15c9ff57b49837ded2af33b2590a9be5c6d43e8970a32898828166463356", 0x41}, {&(0x7f0000001c80)="d68342cde61ac8647f68b85671d48d17b52b7a58347e72d0e8ecd658efa9fae72d459e7df1cc32fc75487cfc1060a7b4747d72da68932ff3010f1071a2d14b3d788fec68147970102f222afa50f04a1fe23e732d276645a94fcce9434db2a9c1a10ced88129dda305ca483ed72383cd3306782de4c0012e96bce8eb8", 0x7c}], 0x5, &(0x7f0000001d80)=[@iv={0xc8, 0x117, 0x2, 0xb3, "107a1fa7b0c4553269efc60add414046970370559b46a03684a73b0f19c51b66a334a76f0dbd037815e76988095f8493c38bfeef1c28d7540b3f71ff35f32341b394511eccdd059618d3bd0f2c47414cb41bf657de2c5a548e61ad853a2a56156f55e2010fd9f56fc3da9ba8c796b9fdc835d8d4ffcdda679cd8300281e7e345c3233f55e4cc523405b98551bcc05c044c08f1adc575aadc6676c01792d6841373c5c1bb85a328fcb584b81c17854cbb3233f5"}], 0xc8, 0x4000}], 0x3, 0x8050) 12:46:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x101000, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x34b, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00e8ff19000e0000000000000000008004ac7f73ac8202b6470140"], 0x1c}}, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x44000, 0x0) sendmsg$nl_crypto(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800200}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=@del={0xe0, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {{'sha3-224-ce\x00'}, [], [], 0x2400, 0x400}}, 0xe0}, 0x1, 0x0, 0x0, 0x2004c044}, 0x8010) r3 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x7, 0x40000) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x40403, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000003c0)='lp\x00', 0x3) [ 295.380396][T13108] Unknown ioctl 19586 [ 295.407597][T13108] Unknown ioctl 19586 12:46:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="5300000044a6aeabec2e1520000000000000001000fff64017db9820000000003b08d403ffff633b27e59aa144175dd106736d17c3298a1e0ccae20000001379000025da3f0dc7ec6e26f7ff80000200000000000000765d7e5293f81a76e5cb8b77c2277b09c1453b21ba1cbb4547ef5faa8d1db9445dc9b767238e5d934b812ab4c9d6876c50570086c5e5225fa1eb31aa81c1c178d5460e32ccca65e2d54768c8739f8822f29629e8ebf032ff9fddc0c2cde2be9747898dc6d3"], 0xbb) syz_open_dev$swradio(0x0, 0x1, 0x2) connect$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000740)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000400000000000000000000000000000000000a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/112], 0x4}}, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000140)}, {0x0}, {&(0x7f0000000a00)="3068e03861b61de4552616b7f495e8c5da1f337d8932a1790920108b4834bdc5f3ceac3cd9a8f63b164ab28429819f8dd99ad41f706e77a8ff171ff0a766df8f46a73400c341968d9d8fdd0614d872fcbff173eb49b35f988d67dcad74fa0d99cc5f5f4cb99965bd28d32a02ee65acf3c7a22d6a25333c358ab4cc48c2b8", 0x7e}, {&(0x7f0000000ac0)="b8362676e09e1d8e927ffdfc2aa9825c065c8956b5fb5d47954f7c685dc802792ec2238e8c6d060b0602824aa52bd299601cc858914de292d66c39733b51494600715d7d8bdcaec1b3a7f5b4b8c681624f2203d319860652b5a24ad4ec2c8266a436754552695c1664f19a637388244b6abebf778a2068fad9946f3f5aeb942f36d4b57e0ba1ed6a2a23b9a668bdeb", 0x8f}], 0x4}, 0x10880) socket$inet(0x10, 0x3, 0xc) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f00000000c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0x326, 0x0, 0x1, 0x0, 0x0, 0x804}, 0x2000c0b1) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/37, 0x25) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4320, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba76, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) read(r2, &(0x7f00000001c0)=""/83, 0x53) ioctl$UI_DEV_SETUP(r3, 0x5501, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)=0x9) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) write$char_usb(0xffffffffffffffff, &(0x7f0000000100)="515ce794263a049a27da90b58ce568fd6197eb1cdae13ba8df3ef6bd256b23", 0x1f) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) 12:46:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000200)=0x177, 0x4) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x1d, &(0x7f00000000c0)=0x3, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f000020d000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r2, &(0x7f0000f61000), 0x353, 0x2040, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_sctp(0xa, 0x1, 0x84) accept(r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) r4 = open(&(0x7f0000000280)='./file0\x00', 0x4440, 0x13b) dup3(r3, r4, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x1, 0x0) write$nbd(r5, &(0x7f0000000080)={0x1000002, 0x0, 0x0, 0x0, 0x0, "82b0cfc4336aa6771538be0633e8bd3410000000000000005616b17333ad88f7e4a258981e458e96afda2a87223ba7f4"}, 0x40) r6 = socket$inet6(0xa, 0x3, 0x6) bind(0xffffffffffffffff, &(0x7f00000003c0)=@vsock={0x28, 0x0, 0x2710, @my=0x1}, 0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x2, 0xf, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r7 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r7, &(0x7f0000000240)=0x202, 0x4000000000dc) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r7, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r8, 0xc05, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_STATUS(r5, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r8, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x1) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e00000023008163e45ae08700000000060f0ec0000000bc4cc91b4dd65b2f0580cb7023f52a556d1cd4f1cbf90a", 0x2e}], 0x1}, 0x0) recvmmsg(r9, &(0x7f0000000040), 0x30b, 0x0, 0x0) [ 295.666058][ C1] sd 0:0:1:0: [sg0] tag#2305 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 295.671209][T13122] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 295.676649][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB: Test Unit Ready [ 295.701581][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.711283][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.721067][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.730829][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.740601][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.750377][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.760151][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.769944][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.779713][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.789508][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.795676][T13126] input: syz1 as /devices/virtual/input/input5 [ 295.799240][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.815078][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.824830][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.826202][T13122] dlm: plock device version mismatch: kernel (1.2.0), user (33554433.0.0) [ 295.834588][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.852857][ C1] sd 0:0:1:0: [sg0] tag#2305 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 295.910713][T13129] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 12:46:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/snapshot\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000000)=0x8) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r6, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) tee(r6, r1, 0x4, 0x5) fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r9, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000300)=0xc) r11 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r11, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) ioctl$sock_SIOCGPGRP(r11, 0x8904, &(0x7f0000000440)=0x0) r13 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in6=@empty, 0x4e20, 0x0, 0x4e24, 0xfffc, 0x15, 0x0, 0x20, 0x21, 0x0, r14}, {0x1000, 0x9, 0xfffffffffffffff8, 0x0, 0x4, 0x1292, 0x7, 0x7}, {0x8, 0x8001, 0xc8c}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in6=@local, 0x4d6}, 0xa, @in6=@mcast2, 0x34ff, 0x1, 0x2, 0x4, 0x7f, 0x5, 0x2}}, 0xe8) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r8, &(0x7f0000000640)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000008}, 0xc, &(0x7f0000000540)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYRES32=r10, @ANYBLOB="a2ddd2ccd589a690a1e74fe5c148254352187ee229bebf7346f4a31dc5b905f3d3f02eeaaea7eae22880a4306ad52ba712f55d1b76e6f1c8df2b99c050ea784778bef2ec315d7180ece4bc60bc7b245e524e0e504f09095c5d81f2e7ebdda767e8ff05f2f5ffc9680dc02a7b635a3db5a24f0a0c00450002000000000000007401900008003300", @ANYRES32=r12, @ANYBLOB='\b\x00b\x00', @ANYRES32=r14, @ANYBLOB="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", @ANYRES32=r15], 0x2fc}, 0x1, 0x0, 0x0, 0x4000}, 0x800) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_NMI(r7, 0xae9a) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r7, 0xae80, 0x0) [ 296.285022][T13133] netlink: 396 bytes leftover after parsing attributes in process `syz-executor.3'. [ 296.426554][T13133] netlink: 396 bytes leftover after parsing attributes in process `syz-executor.3'. [ 296.462239][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 296.466741][T13129] dlm: plock device version mismatch: kernel (1.2.0), user (33554433.0.0) [ 296.468594][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 296.479306][T13125] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 296.578262][ C0] sd 0:0:1:0: [sg0] tag#6466 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 296.588826][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB: Test Unit Ready [ 296.595476][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.605201][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.614930][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.624663][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.634403][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.644141][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.653876][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.663630][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.673543][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.683393][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.693144][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.702889][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.712760][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.722603][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 296.732437][ C0] sd 0:0:1:0: [sg0] tag#6466 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 12:46:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400000}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0) r1 = syz_open_dev$media(&(0x7f0000000640)='/dev/media#\x00', 0x1000000008, 0x15f90a362e8e50ab) bind$isdn(r1, &(0x7f00000001c0)={0x22, 0x4, 0x7, 0x9, 0x1}, 0x6) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) migrate_pages(r2, 0x7fff, &(0x7f0000000080)=0x10, &(0x7f00000000c0)=0x400) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000b00)={0x0, 0x6}, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4002, 0x175) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000000140)={0x0, 0x7f, 0x0, 0x3}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='|\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x81, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r7 = getpid() write$cgroup_pid(r6, &(0x7f0000000200)=r7, 0x12) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r8, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r8, 0xc, 0x1, 0x401, &(0x7f0000000280)=[0x0], 0x1}, 0x20) tkill(r7, 0xf) socket$inet6_sctp(0xa, 0x0, 0x84) socket$caif_stream(0x25, 0x1, 0x5) r9 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x400) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) write$binfmt_script(r6, &(0x7f0000000400)={'#! ', './file0', [], 0xa, "e623fe817b451d28c53fdaf98b5fb274fb2e6b785a687fe0489957b7f8ff947b418d87e3019855cdace1674b895c6047119d4e2cbcf8f4f6211811c432329621df286841883bb8eaea72312799803112ee415268ce477470b26aea667d0cc55afe01b5e60250bf64b73fdc5ff1bc7b58aed497c6481f343420c5120a10aeda2e57ae15e00ada3cf8223cbc1978b1c5240c9f331eb7404b"}, 0xa2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r10, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r10, 0x40045542, &(0x7f0000000500)=0xfffffffe) ioctl$SCSI_IOCTL_SEND_COMMAND(r9, 0x1, &(0x7f0000000300)={0x72, 0x5, 0xf3, "f582807b1ba436c880851567d335a739f43805ae5e03675f9fa3be2fb8f9356b42214c5207c5f9ecfda3e8c5d526319d802642c9a9d88a181b44566742892a2d561cad01cff972f6439ad4295fe530f76eb353d7fff0f96219d17887e242b9397e4324ff9e039bd5352bba94d6afa6542b78"}) 12:46:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="5300000044a6aeabec2e1520000000000000001000fff64017db9820000000003b08d403ffff633b27e59aa144175dd106736d17c3298a1e0ccae20000001379000025da3f0dc7ec6e26f7ff80000200000000000000765d7e5293f81a76e5cb8b77c2277b09c1453b21ba1cbb4547ef5faa8d1db9445dc9b767238e5d934b812ab4c9d6876c50570086c5e5225fa1eb31aa81c1c178d5460e32ccca65e2d54768c8739f8822f29629e8ebf032ff9fddc0c2cde2be9747898dc6d3"], 0xbb) syz_open_dev$swradio(0x0, 0x1, 0x2) connect$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000740)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000400000000000000000000000000000000000a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/112], 0x4}}, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000140)}, {0x0}, {&(0x7f0000000a00)="3068e03861b61de4552616b7f495e8c5da1f337d8932a1790920108b4834bdc5f3ceac3cd9a8f63b164ab28429819f8dd99ad41f706e77a8ff171ff0a766df8f46a73400c341968d9d8fdd0614d872fcbff173eb49b35f988d67dcad74fa0d99cc5f5f4cb99965bd28d32a02ee65acf3c7a22d6a25333c358ab4cc48c2b8", 0x7e}, {&(0x7f0000000ac0)="b8362676e09e1d8e927ffdfc2aa9825c065c8956b5fb5d47954f7c685dc802792ec2238e8c6d060b0602824aa52bd299601cc858914de292d66c39733b51494600715d7d8bdcaec1b3a7f5b4b8c681624f2203d319860652b5a24ad4ec2c8266a436754552695c1664f19a637388244b6abebf778a2068fad9946f3f5aeb942f36d4b57e0ba1ed6a2a23b9a668bdeb", 0x8f}], 0x4}, 0x10880) socket$inet(0x10, 0x3, 0xc) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f00000000c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0x326, 0x0, 0x1, 0x0, 0x0, 0x804}, 0x2000c0b1) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/37, 0x25) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4320, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba76, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) read(r2, &(0x7f00000001c0)=""/83, 0x53) ioctl$UI_DEV_SETUP(r3, 0x5501, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)=0x9) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) write$char_usb(0xffffffffffffffff, &(0x7f0000000100)="515ce794263a049a27da90b58ce568fd6197eb1cdae13ba8df3ef6bd256b23", 0x1f) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) 12:46:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MAX_AGE={0x8, 0x3, 0x597}]}}}]}, 0x3c}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x2d, 0x6, 0xe388, 0x7, 0x100, r1, 0x100, [], r2, 0xffffffffffffffff, 0x1, 0x2}, 0x3c) [ 297.125807][ C0] sd 0:0:1:0: [sg0] tag#6467 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 297.136375][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB: Test Unit Ready [ 297.143030][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.152830][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.162598][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12:46:51 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "4059b8", 0x18, 0x2f, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, {[], @tcp={{0x3580, 0x88be, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"b0598a7d"}}}}}}}, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x44002) write$snddsp(r0, &(0x7f0000000040)="c877", 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x31, 0x5, 0x14, 0xf, 0x0, 0x200, 0x5, 0xc1, 0xffffffffffffffff}) [ 297.172332][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.182114][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.191919][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.201719][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.211697][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.221439][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.231342][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.241243][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.251082][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.260882][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12:46:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r4 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r3, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r2, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r5, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r9 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r8, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r11 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r10, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r11, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r9, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) r12 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r13 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r12, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r15 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r14, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r15, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r13, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) r16 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r16, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r19 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r18, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r19, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r17, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) r20 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r21 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r20, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r23 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r22, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r23, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r21, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) r24 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r24, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r26 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r25, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r26, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r26, 0x0, 0x0, 0x0, 0x0, 0x2}]) r27 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r28 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r27, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r30 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r29, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r30, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r28, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) syz_emit_ethernet(0x7, &(0x7f0000000800)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYBLOB="0999c800ff803a5f5bc089dd4137ce93b8b5a7eb8254cca800e58f1a88590e76ff9ce81290875a6f3ef9c736985b53ba4657b3c50ff32287b00220110b4b9fb1e62cea1f889b4bb17cf45c37e2a4f43a91a1ca3ad476d0cc07acc3adef687022b0dd32ad76799df82975abe21249c4a39c5c5b0037fa67826303655dc3c71e898ea2bbedd2dfa3ae2d943dd19debdf674f34deefaae6b64b5a3cc9490b7e7b377216beff0144ae34bdc10a35dae10cb0b04fdd0e82db20110bc5ad5ed75ffac024429caef7f7b3fb4b31f437276e257ddd91ed0010450221504525e94f8921ea5b897572ef8b2be4123247b58eb2230d7fd296", @ANYRES64, @ANYRESDEC=r5, @ANYPTR, @ANYRESHEX=r6, @ANYRES32], @ANYRES16=r9, @ANYBLOB="2f3c7b243db4cefac4190781260516acd06b74fe4cbbca60c120d84b2b58d04a40975ff32f9c8347128334981be741c2e2abc8d31bdd1028de7e8ffb50a13d99e05d854c2f9c6f5fcc6a1f1b251a8b3919", @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYPTR64, @ANYPTR64], @ANYRES64=r13, @ANYBLOB="de99d5c2eb534be4f5b06a155d7351328d58934b0b6e4e4c03abd34e522036bcf3841c787fcc21495b47999cd00bb614567e408cfbac600ce3dec5cc70bad9e31909be6654b9e45de84f0a7e4d6503f60bbd8adfd100a3261fd266b29908b51e9e54273e6f70d9cf835f77a99b6ec45c3459bacde1a082549305f3d5505746bef4ccab8a470651d3555f520f9e940424c60c9a9b437ff855099c5261e716a84448cf7ff50cbc0704fbc07c1a434a7958c841ea612dfa7d1ae98fce45fba72d8a6068f92cc6d6b8e572a5dc64ce523561f1efc6488a34ac98ecba4484246b6e91db9d5d7762a4d67cb2ccacede79d0fc714b8848c976776"], @ANYRESOCT, @ANYBLOB="87edddc204652157ad8448cd2de80a40739dfef56708700dcb219e5eba4f4047fb438b04c57e8efe64a4988bccb9ab4d86e07b4f1010637f2318c2d213fcde2e76faad54474de1e04d1e2d76688d0b283c23ffe86e2da7ae701dd79ceddacc112a581c4f8d503bc53be513916f96eaee305a49e7aefb5152475fd1363747a01b74546ded5ac51e61d9b7e2602c01c833badf61d2", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRESHEX, @ANYRESHEX=0x0, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES16=r18, @ANYBLOB="2e0070b83515dfc51b21628d520e9c169571c2af5b0af0442cdb8e0b24b87d6c8b8c48ba310960c6980bcd2e4abad47cccf5c8a6d0da701ad90965c98923adb085e0d45e472aa311e67e397c2d05279f0ad02292eeb738f6734338e7ef67c38c30463970ece9d90ca3558363ba7a47726a852d26a3", @ANYRES32, @ANYRES32, @ANYRES64=r9, @ANYRESOCT], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESHEX], @ANYRES64=r23, @ANYRESHEX=r6, @ANYRESHEX=r24, @ANYRES16=0x0], @ANYRES64=r25, @ANYRESDEC=r30, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES32, @ANYPTR64=&(0x7f0000000780)=ANY=[@ANYPTR, @ANYRES16=r7, @ANYRESOCT=0x0, @ANYBLOB="a42e587e78bc179c4a0877c7f5ebadb0a74344cddca0658156a2350f161573edc8f9ab87f683270479a3e2c7683c523ed2"]]], 0x0) [ 297.270688][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.280567][ C0] sd 0:0:1:0: [sg0] tag#6467 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 297.388533][T13155] input: syz1 as /devices/virtual/input/input7 [ 297.422301][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 297.428626][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:46:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000100"/20, @ANYRES32=0x0, @ANYBLOB="00000000fa000000c4f5ce70c5a87648c90fc7980000000016061000010027000d00000095c9f753e5fe8891c0801583007c4f22b45aed18c4ea1c52a2ee75"], 0x3c}}, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x200000, 0x0) accept$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r2, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) r3 = dup2(r2, 0xffffffffffffffff) vmsplice(r3, &(0x7f0000000540)=[{&(0x7f00000001c0)="ea32abbc590fde3d6d91f087cc1e3d7c86f10b6c260f0f1b78b8858d452b5de2afe379edb89361f22fc8c2defd358b865b032ecc7f90d08081b56864e37fb64f32131ed5bb909f1b9b8a3c3514dc72452b1777c44fe8fb152b330bd6bfd1054368c1a52b8c9f25c5be1ea37fb8100415bf16972b807da590a65d44e2606d7988f8613e2acf1c752a1dc902e541096bdcdd76b252908424d50fdab105bfe3ba1a2360e8275eb84f645c85788c55e0cecea345ffc7857ab130c23e6318d26ea453f2b6778eaaa3a7", 0xc7}, {&(0x7f00000002c0)="2df73185ef5eaeb628040a76dd4036e0384ff55693a0c5fb2d6f79c0b142a2d12fdb48282bffafd20151ae1ebb6997d782efe4426d6ae072f8daded08484323dc1774f30f5f2b7c39e484099426e25b53b477f8af2574671c488efaadf1184ba2f2b65b9b7f2edb8bf907e412a3137d5d783ee7d4efbbf55709277390f1c9d1ee89b5f226ffc2580a83fbde32905474d5c7a634fdf94a9500265651a9b8ee39c13b02e64e8b22957b03877675a03258f0c2a4d8c2b363fc753885042341e1927ce9a", 0xc2}, {&(0x7f00000003c0)="20795622bd5b4c74b6a9cc6bac58b3b41a305600625cbf2391eba96b09be1ef5f860a02adaac1832ccee5ecd217294a0967d29824315eb77e72cf454fd1fe094a713", 0x42}, {&(0x7f0000000440)="ce7d09b913d8f94c9d07dd2023a1e4b93ee37d8049dfe0ec6282431804d05392ae3bce8b7299dc1406f60d2cc321a016d99ea42e736960a113a34bbbfd6b6662a02b828b2ddca0fc310827ff0e90ce35f6095064828f7b20518981dc53da36df3f0aeee53d00b9e97671c8ae4e9b9ea731c1d9376cbc4a0dd13547d1c4f91059096cb5eb9a32a50763bfea592ed03d014e9c21979637d52899a0cc6685b5bd297574361446692958dc8b469895a34469ccd9598acbe86d0960d913873a6e93d21821c3b6d4828bb119e22e7433972cde4dfa6710", 0xd4}], 0x4, 0x1d) 12:46:51 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="2321a5f2fe09c5286f3037b71c7fedfc31fb766b53cfd228ef987ad9638c692a24072e5c0dea84e6f022c3dff28ed6c7c287b6bbf6fe728559c525a23cab0133b577a9a4287d2ebe150f451e5ab76f7f340294f2c6a031cf76aec2cb73"], 0x6) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = gettid() syz_open_procfs(r1, &(0x7f0000000080)='smaps\x00') ioprio_get$pid(0x2, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = gettid() syz_open_procfs(r2, &(0x7f0000000080)='smaps\x00') close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) [ 297.670515][T13170] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 12:46:51 executing program 3: r0 = socket(0xa, 0x80002, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000000c0)=0x1002, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r2, 0x0) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000100)=0x7f9) sched_getscheduler(0xffffffffffffffff) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0xffe5, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, 0x0}, 0x2001) [ 297.744200][T13170] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 12:46:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) utime(&(0x7f0000000b40)='./file0\x00', &(0x7f0000001ec0)={0x1, 0x6}) write$binfmt_misc(r0, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], 0x251) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000003c0)=ANY=[@ANYBLOB="080000000000000002004e21e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e238000"/517], 0x210) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000001f80)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={r2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000b00)={r2, 0x6}, 0x8) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f00000001c0)="bc", 0x1, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140)={0xffffff80, 0x6, 0x78c, 0x3}, 0x10) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x81, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000080)={0x0, 0x1, 0x6, 0x3f, 0xd339}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r4) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r5, 0x20000103, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0}]) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000001f00), &(0x7f0000001f40)=0xc) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000001fc0)={r6, @in={{0x2, 0x4e21, @remote}}}, 0x84) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) 12:46:52 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f0000000180)={0x6, 'bridge0\x00', {0x7fff}, 0x7}) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0, 0x1}, 0x8) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1fff8, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 298.058618][ C1] sd 0:0:1:0: [sg0] tag#2308 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 298.069335][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB: Test Unit Ready [ 298.076041][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.086203][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.096039][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.105859][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.115666][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.125441][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.135317][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.146051][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.155885][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.165664][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.175461][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.185240][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.195032][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12:46:52 executing program 3: writev(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000a00)="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", 0x64a}], 0x1) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r5 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r4, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r3, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r3, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r1, 0xc0045004, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreq(r6, 0x0, 0x23, &(0x7f00000000c0)={@remote}, &(0x7f0000000140)=0x8) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0x10c8}], 0x1) 12:46:52 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="5000000090780000"], 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000200)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e23, 0x7, @empty, 0x6}, @in6={0xa, 0x4e21, 0x80000000, @dev={0xfe, 0x80, [], 0x2a}}, @in6={0xa, 0x4e24, 0x0, @remote, 0x6}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e22, @local}], 0x84) [ 298.204808][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 298.214611][ C1] sd 0:0:1:0: [sg0] tag#2308 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 12:46:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r3 = getpid() write$cgroup_pid(r2, &(0x7f0000000200)=r3, 0x12) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x0, &(0x7f0000000000)=""/70) r4 = socket$inet(0x10, 0x2, 0x0) sendmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000001c0)="24000000190007041dfffd946f6105000a600000fe02000000020800080012000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0xc1}], 0x1}, 0x0) [ 298.353494][T13202] sg_write: process 51 (syz-executor.1) changed security contexts after opening file descriptor, this is not allowed. 12:46:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a1120009000e00009900000000000000000000812fa80004000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) 12:46:52 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1) r0 = socket$inet6(0xa, 0x100000003, 0x3a) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r3 = getpid() write$cgroup_pid(r2, &(0x7f0000000200)=r3, 0x12) socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x6, r3}) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 298.491616][T13207] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 298.529957][T13209] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 298.564136][T13209] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 298.574530][T13211] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:46:52 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xffffffffffffff07, &(0x7f0000000080), 0x54c672c49e793c2, 0x0, 0xff4b}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00', 0x1}, 0x18) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffdfffffffffffff, r1, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r1, 0x3b72, &(0x7f0000000040)={0x20, 0x2, 0x5, 0x1ff, 0xb5}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x8) ioctl$sock_ifreq(r0, 0x800000089f9, &(0x7f0000000180)={'sit0\x00\x00\x00\x00\x00\x00\xff\xff\x00\x00Z\x00', @ifru_flags}) 12:46:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r5 = getpid() write$cgroup_pid(r4, &(0x7f0000000200)=r5, 0x12) getpgid(r5) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000040)={0xffffffff}, 0x4) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) 12:46:52 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x3ff, @local, 0x1}, 0x1c) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x18, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@sack={0x5, 0x2}]}}}}}}}}, 0x0) 12:46:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc4\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="d5e647340de82798427f0713871b837b9778a8a6b3a056640896300421c45d1094556e77cc0eb4ccc49d6182012c96b40c5b3018cc5f26e3f2662fc3a88a794697a44e3224474ad0c3e810ea"], 0xfdef) open(&(0x7f0000000040)='./file0\x00', 0x2040, 0x4b) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) [ 298.883340][T13225] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:46:53 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffff4c, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x2, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r2 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r1, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x95}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x2}]) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f00000001c0)="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") r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000140)={0x3, 0x5, 0xc53}) r4 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r4, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) fcntl$dupfd(r4, 0x203, r3) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000100)={0x4, {0x8, 0x80000000, 0xffffffff, 0x3b0}}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200085}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 12:46:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000000)=0x1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400208) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000003c0)={0x0, 0xfffffcce, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c0000003f0007000a0002000a0ada1b40d805000500c50083b8", 0x8d}], 0x1000000000000168}, 0x0) ftruncate(0xffffffffffffffff, 0x20080000) [ 299.093336][T13230] device nr0 entered promiscuous mode 12:46:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x208200) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$USBDEVFS_FREE_STREAMS(r2, 0x8008551d, &(0x7f0000000400)=ANY=[@ANYBLOB="0a420000be840000000000000007b01b52a29a3cf30e17fc087f"]) openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000540)=@assoc_value={0x0, 0x1ff}, 0x8) ioctl(0xffffffffffffffff, 0xfffffbfffff3ffa9, &(0x7f0000000340)="7d9bafe44906ddae69d4f8a5e0b5b17a3c0100be11ec10a66431ba1152af58c535cd775af633c24f1713ea1447221f2771") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)={0x0, 0x0}) syz_open_procfs$namespace(r4, 0x0) openat(r2, &(0x7f00000004c0)='./bus\x00', 0x2000, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fwL-t\xfc\xaa\x12m\x03\xb9bM\xba\xf1\x02\xf9\xcc`rtA\xa6\x9d\x86\xfc\xd2\x8d\xb6L\xc7Nw\xf9UU#8\xa1\xb7\v\xa4yu\xbc\xb9FnRHm\xf7\xf62B\xf3\xc5\xdbi\x82\xe5\x13\xcd<=_\x88\t\x9c\xd5@\xb5\x8b\xdet\xd1\xa1\x040/eH\xba\xabL\x87Zvy\b4\tqT,[\x852\xc4Yf\xdc]\xcc\x18h\xf2\xbf)\x8eg\f\"-\x1a\x99\x0e\xc3\x1cg\xd2\x8f\xb8\xc9P\x05\xdb\xb6\x1a;]\xa2\xb3\xe1J\xba\xcbK\xe2x\xae9\x85\xc8F\xb4b\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40), 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="ec86c63b4e9ff45447d7475e3ae4bce60951f01af23e6a9137d6e0cd6f780702538d9a0f0e233dc0c69b12af9d842f4e180de4dfce066ea778b42ad36374abf93517c64b3ff212b2d4b5349deef0faf1e7f6018640dc3788478a0edc2d2936fbfa8d14d9e1e32664b6ff9d1ceca9a15e1c368a4ca3a39686deb132ff94b4e9aa73e8be98876b9616be37d712836655b28542e3a5294722edd18537d4bec7dc60722b3ffa6ba5155d42a230d8b20703e42625673620ceb9afb5c516fff593ac53d97c212832dbfd3f0060a60f798dfa97be90ce5f661cf5d3f6d87e1189d1694c3dc9e92aaeb555455e9421824a29112ee7223feea8ea77855c69b4d8a8ddc1f4ce66a77bf10479d19df932523cca97f406054f200b8ce0982cc35a1dc216955fe2f61b4d04e0ea00"/313], &(0x7f00000001c0)=0x2) r6 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r6, 0xc0745645, &(0x7f0000000380)={0x7f, [0x1, 0x7e0, 0x7, 0xcf6, 0x101, 0x101, 0x52, 0x1ff, 0x8, 0xfffa, 0x800, 0xfff9, 0x8, 0x0, 0x2, 0x100, 0x0, 0x8, 0x0, 0x0, 0x9, 0x5, 0x9, 0x8, 0x2, 0xe1db, 0x4, 0x400, 0x9, 0x2, 0x8, 0x100, 0x6, 0xfc00, 0xfff7, 0x5, 0x46, 0x0, 0x7, 0x2a, 0x40, 0x7f, 0x3, 0x0, 0x2, 0x2, 0x6, 0x3], 0x7}) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r7, 0x0) r8 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lseek(r8, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)={r9, 0x0, 0x0, "b1"}, 0x200000c9) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r8, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=r9, @ANYBLOB="b3000000fe020000000000000034e300278388f2a1816605787304f9ace25900731051e1dc23fc135fb60af25b7e1b1d991dd1c58f951669b1937b868370c83400209692cb2054f7de88c9aad9b4431390e65a3d72a95fc7268641edd4f214b7d6e9b0010938b0209d51171ab14987c04f5d93c7e31d0461abaae1c273d283d40b47f46593edeaaab401ca1c446100"/156], &(0x7f00000000c0)=0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000440)={r9, 0xa5c}, 0xc) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000040)=0xd6be, 0x4) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x80, 0x1) 12:46:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee40c0c00000f0000008bc609f6d8ffff3b06000000000000000000", 0x23}], 0x1}, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001180)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000001440)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001400)={&(0x7f00000011c0)={0x220, r2, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbf0d}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xd3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9e}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7a}]}, @TIPC_NLA_MEDIA={0xf4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x31c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x51f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}]}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x40880}, 0x1) recvmsg$kcm(r0, &(0x7f0000008800)={0x0, 0x0, &(0x7f0000008740)=[{&(0x7f0000007640)=""/123, 0x7b}, {&(0x7f0000000100)=""/4111, 0x100f}, {&(0x7f00000086c0)=""/107, 0x6b}], 0x340}, 0x0) recvmsg(r0, &(0x7f000000c0c0)={0x0, 0x0, 0x0}, 0x0) [ 299.374831][T13230] device nr0 entered promiscuous mode 12:46:53 executing program 3: unshare(0x20400) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000780)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000100)={'bridge_slave_0\x00', 0x7b}) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) 12:46:53 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x180006, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000000140), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x8e) 12:46:54 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r5, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x3, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000001480)='/dev/null\x00', 0x4c00, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001b00)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r7, &(0x7f00000015c0)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="62e31cba48e1c67e83a5acc640bfc6079326b7bb14a63c9724502c827a730f6d78a97a342303d7f18fb227fc8d040b7888e3a3b9dee69ad97b61480ddf64557daf4ff591601c2249995b61ec011afa966348e8a98a79a125b6e24e727591ef235e6894cfe069de454b909c57f4ee422a4c89791256be6f611a59bbb15d016b966ecba36a100216b13988937e7bbfae788c85a8d167848118ff8cb238a96ea23ad16f7ad987554b96468157b10449f169a85ec040a7e7837fafa05ebef0bd050046230573dea4a781c1c5c2ba07c11d537950c59d8da8f74869f4b3812220c309bcfe1146406af15083ec5ab51756f289", @ANYRES16=r8, @ANYBLOB="0204552c01000000000000000031b089b5af000003d5f79263d04c8a56f00e8d6d6b4f1bd5e52ce61c9fb860c0f421952ed8b99021c4e623abb428aff3353005542dd14646714fd1f3f93656e078faec1c2f6bc5c7fdeb8500e6f64fed7034237f2148c862eb8fbfbf89044587bf7ed97d4b25cedc4431557205c6841eafdd163c41c3cfcf4b651971923dd388079a1ac9302d3335814251583cf871a065b82ffac1284dad673f1b3b2425b0a32e54d7dcea0f47407474af593830b70ff6a8ef9d93b08d216d4cba92fc"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) io_setup(0xab9, &(0x7f0000001880)=0x0) ioctl$TIOCSERGETLSR(r6, 0x5459, &(0x7f00000002c0)) io_cancel(r9, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x7, 0x0, r6, &(0x7f00000018c0)="d9419609", 0x4, 0x7fff, 0x0, 0x1, r7}, &(0x7f0000001940)) sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f00000016c0)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001680)={&(0x7f0000000880)=ANY=[@ANYBLOB="82e4b13392ded97d29216b08b49c0062dab0aeadcca5b9b3fcf56542a1f984331732ff0171833309d2fc6f309c7ebcdfb0ff34234e811ce6a74ae75fb8d26355f56751cbfcbd10eaa555295976c52b8000ee1c40ea5967d7bb92caa0516508df6d58e6ca78c97604122303d2a2ee5856ef03d5f7fffffffffffffff7b0e7e8ea2495463e102098db0252a65ff5bd7249abbce6e7ab83cf8dd20e7fd975845cb89492d3318e1e908d9dffbf5a1ebee2103610df3f86da0f379e1870d0f8749b7a1124f61fa1fe5d866f7229e78350c2340add2b7f9ef8de944b132e4857b872337e279f5b648e57f2859a6e2b0000cc50c1b4d08ac85222444db25afbdb6493155d1c9de2424fd7ba668f1d18befc6c36d49fc5b7c039456e188a53d3", @ANYRES16=r8, @ANYBLOB="000425bd7000fcdbdf2508000000080005000080000008000400280e00002400010008000b007369700008000b007369700008000900377c0000080009003000000008000500ff0f0000080006000500000000000000000000000c501b8503c53c32afd9657370722c254ede1683d9648fd0dce7d0571fdad88677e7d702d8c445e1465ac7f722e594984984563d402c33679ac4e286781f465bafc463bacf1a73f2de4e52d458f73de6e2c6280cce9267e3fcd03d522e500e063b9d62058b81d19259e61d1cc85394bfc750e5e7de2a6edfd8f7646eb21e230ea1546feb5831cea4064ec260a9e36e4074b9e3e5c8c8102998a82b1ed74f3be40168f7a19c16e96f232ec94c5da36fda1685fcfeedd4a98a91b465d0c1cbde046154db1f87473d90dcbf9fa50f53a0a59c7a9e0cac2464a92720f7f854a98e6c09c3f94b2ec7bd0353c18dcdeaf33ab508c9c743f24530fa5187a5a9a75a88cdc9e9d8ae1b9e277b3589f73a11f9cdf8d5365869516c35048b4ef44ca14e926dd496937b41cdc4f21ca1ce914e7ba1590b9beeaca36661a1a4aa09b3a546cf57b6257641cfae3d9f386688ac45e4cb3fe7c59e2d22eb913ee9"], 0x60}, 0x1, 0x0, 0x0, 0x55}, 0x20000000) sendmsg$IPVS_CMD_FLUSH(r5, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x848010}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x9c, r8, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xaa0}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0xf18b19f91279d1ff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x28}}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7ff}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x10}}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x8000}, 0x10) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8000000190001ffff04000000000000ff010000000000a85400000000000001e000000100000000000000000000000000000000000000000a00000a000000000029430f7a21dda26d37ff6842a842fdfe0632078a505aabc579d2c804691435c327c52f9091b29ab603b57911119347676551f23c2f945101f2be6b176dbdb427d1f6f8365a876a96d98535b135df0d8bc4c587", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ec0000000000000000000000000000e33eb88500a22580106acb896827348a8f4df0744c73a5fd4bb1bff83e874c60070d634a3c9097ad93ec3d5d4488fa286145aaa8bf5bf03374a977b588c801e1f42c54460d9ea61c9749ae06a2289c3395839605854e8c617261f43bad0fd3ba5ade9fbb68c08e83"], 0xb8}}, 0x0) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000000), 0x4) [ 299.973431][T13259] IPVS: ftp: loaded support on port[0] = 21 12:46:54 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x800) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x8000) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, 0x0) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f00000000c0)=0x1, 0x4) 12:46:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lseek(r2, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)={r3, 0x0, 0x0, "b1"}, 0x200000c9) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=r3, @ANYBLOB="b3000000fe020000000000000034e300278388f2a1816605787304f9ace25900731051e1dc23fc135fb60af25b7e1b1d991dd1c58f951669b1937b868370c83400209692cb2054f7de88c9aad9b4431390e65a3d72a95fc7268641edd4f214b7d6e9b0010938b0209d51171ab14987c04f5d93c7e31d0461abaae1c273d283d40b47f46593edeaaab401ca1c446100"/156], &(0x7f00000000c0)=0x2) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x26}}}, 0x0, 0x7}, 0x90) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r4 = dup(r0) write$uinput_user_dev(r4, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101]}, 0x45c) write$uinput_user_dev(r0, &(0x7f0000000240)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl$UI_DEV_CREATE(r4, 0x5501) [ 300.187232][T13271] input: syz0 as /devices/virtual/input/input8 12:46:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f0000000100)={0x6, 'team0\x00', {0x7f}, 0x1}) r3 = socket$inet_sctp(0x2, 0x1, 0x84) dup(r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r4, 0xc034564b, &(0x7f0000000240)={0x2, 0x38414261, 0xff, 0xa1b, 0x3, @discrete={0x3, 0x4}}) sendmsg$inet(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, @rand_addr=0x6}, 0xfffffffffffffc1e, 0x0, 0x0, &(0x7f000000c200)=[@ip_ttl={{0x0, 0x0, 0x2, 0x2}}, @ip_ttl={{0x0, 0x0, 0x2, 0xffffffff}}], 0x30}, 0x0) r5 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyprintk\x00', 0x400880, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r7 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r6, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x2}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r7, 0xc0096616, &(0x7f0000000180)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000000c0)) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) [ 300.297947][T13275] input: syz0 as /devices/virtual/input/input9 12:46:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000000eef660a5ca543dd70008a254a4b583939f2e60fa63360323a9d10bd35cfa5f3a0f8b51d7b709a65dc7355c4725", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c0001006772657461700000180002000800030000000000040012000800040000000000"], 0x48}}, 0x0) 12:46:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) 12:46:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x400000000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) execveat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000600)=[&(0x7f00000000c0)='/dev/uinput\x00', &(0x7f0000000100)='(posix_acl_accessselfppp0\x00', &(0x7f00000005c0)='syz1\x00'], &(0x7f0000000880)=[&(0x7f0000000640)=']+\x00', &(0x7f0000000680)='.\x00', &(0x7f00000006c0)='vmnet0]\x00', &(0x7f0000000700)='GPLeth0vboxnet0trustednodev-keyring\x00', &(0x7f0000000740)='\x00', &(0x7f0000000780)='\xe6\x00', &(0x7f00000007c0)='selinuxnodev-em1\x00', &(0x7f0000000800)='em1*vboxnet1-\x00', &(0x7f0000000840)='/dev/uinput\x00'], 0x400) write$uinput_user_dev(r0, &(0x7f0000000140)={'syz1\x00', {}, 0x35, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000900)='/dev/autofs\x00', 0x80000, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000940), 0x2) [ 300.523375][T13286] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. 12:46:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = gettid() syz_open_procfs(r3, &(0x7f0000000000)='fd/4\x00') write$tun(r1, &(0x7f0000000080)={@val={0x0, 0x8847}, @void, @eth={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1567ccf089282ff5}, @dev={[], 0x15}, [{[{0x9100, 0x3}], {0x8100, 0x5, 0x1, 0x4}}], {@ipx={0x8137, {0xffff, 0x3e, 0x4, 0x1, {@current, @random="2285ca94639b", 0x1}, {@broadcast, @random="52af8fe9b409", 0x5}, "91263fb5246519a11b61ed32a2800f948ce049d9a9cca27171a0a120518b93b4"}}}}}, 0x58) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="01ef57a5ae00000400000000002c0012001000010069703665727370616e0000001800c01d44ae1d7cf58ce1083e515b2df51a0200040012000800160002000000080018000000000087a99a3a8a7da90fb8e69f95e1f2a16597ab8baf96af1694e1b205da1af932d7aa2ea496cce2a0b52129b0fcf6f6d758f273a5e9547a21f18dc810832418742ee78b04e08b8086da044700b154538ad2cf71bb47b6c22681fc27c88ff9dc32ab37343a5ea780fa4f622843a5515e68b142553503d7a96ce66226cabe4ecc5e6489866fe02e56c87dfea26be37e4f39324c8fd986f37b9b4caf646dd7b4ab54caf3863d0f7e71799192cfcbbd8667e901bcbb587bc51e27595e62aadf4bd33206f070029d32da1aeeadc912e12775b0c6a4b08663c7c8dd1a155b48409657af9db8402fee1fe6fb4f4654f6c684365b4f63ecb5e1e3c5782e7746c56d0902c7908b48e83e0f402bd1ab851be28aa92178377dde155a801f6f45b56db6a2c566c541a14caf700eccd3cd2f14c03ced4325314263256bdb4165b701381212ff425753092f17e3d83c1c7fcd337b3ca88bbd00"/425], 0x4c}}, 0x0) [ 300.674481][T13290] input: syz1 as /devices/virtual/input/input10 12:46:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) [ 300.738467][T13290] input: syz1 as /devices/virtual/input/input11 12:46:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f00000001c0), 0xffffe64}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000480)="1f", 0x1}], 0x1}}], 0x2, 0x10) [ 300.899031][T13299] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. 12:46:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000000)=0x1) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xffffffd6) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r2, 0x0) [ 300.950834][T13302] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 301.202731][T13259] IPVS: ftp: loaded support on port[0] = 21 12:46:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) 12:46:55 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x80000, 0x0) sendmsg(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="2400000020007be167fffd946f6105000a0000061f00000000000800080017000400ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:46:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKMODE={0x0, 0x11, 0xfa}]}, 0x28}}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x8, 0x7fff}, {0x401}]}, 0x14, 0x3) 12:46:55 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000140)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getpeername(r1, &(0x7f00000000c0)=@isdn, &(0x7f0000000040)=0x80) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lseek(r3, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)={r4, 0x0, 0x0, "b1"}, 0x200000c9) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=r4, @ANYBLOB="b3000000fe020000000000000034e300278388f2a1816605787304f9ace25900731051e1dc23fc135fb60af25b7e1b1d991dd1c58f951669b1937b868370c83400209692cb2054f7de88c9aad9b4431390e65a3d72a95fc7268641edd4f214b7d6e9b0010938b0209d51171ab14987c04f5d93c7e31d0461abaae1c273d283d40b47f46593edeaaab401ca1c446100"/156], &(0x7f00000000c0)=0x2) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0xfffe, 0x1, 0x800f, 0x5, 0x1800, 0x3, 0x5, 0x9, r4}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r5 = gettid() r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r6, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0x40086607, &(0x7f00000001c0)=0x5) process_vm_writev(r5, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000000000)=[{&(0x7f00007a9000)=""/1, 0x1}], 0x1, 0x0) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r7, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r7, 0x84, 0x74, &(0x7f0000000200)=""/208, &(0x7f0000000300)=0xd0) [ 301.544958][T13317] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. [ 301.562160][ T1763] tipc: TX() has been purged, node left! [ 301.578145][T13320] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:46:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r7 = getpid() write$cgroup_pid(r6, &(0x7f0000000200)=r7, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r7, r3, 0x0, 0x1, &(0x7f00000001c0)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r4, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000180)=',cgroupsystembdev\x7feth0%\x00', r8}, 0x30) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fsetxattr$system_posix_acl(r1, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000040)={{}, {0x8}}, 0x24, 0x0) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r9, 0x0) ioctl$VHOST_SET_FEATURES(r9, 0x4008af00, &(0x7f0000000840)=0x1d) dup3(r0, r1, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000800)={0x0, &(0x7f00000007c0)=[&(0x7f0000000340)="29dd6b81c9c542cd11b785137f7325a933fd99dc2721a0e04f37250b884478601324cb782127984259bd45ede6b64ee420fd63407ffbee6de91988a88824c3deaa8764e0f68a931b46ecda5f406596780e643f3cfff0d252f6b3f37ee9e24b77f7556fbbaaa39940947c1062d50355cf54d503de084c0f1bfcf7da3f2ef6592cf48eda795f44b76f673d4b", &(0x7f0000000400)="4f770a346ed69cae1ef8a6868410e8f1a95b51bca1b2fafec16456faf66a26403f9cb2428400f146130a5fefaa39b28bc1577ddbff378f1ec452abda8dd59499ec3bee69d0ceff1ae80427464adc5cf524f6719a8172350e0ba7e770b09d4ee7171a7a1ef9398a5eeab63ebb46bdd6153c48f71d47ff08e0e89639069ce459224dd9122ff31535251e479b44d1b6a8dc98472168e12ddb4542fbdfd89a68880b844637c733e29e23e13610a7b29afa78ea58cbfd8114a055dbef240a0c0bc1bbd6358d39cfbc874785ce500b5c7aa00e4a15f2ad9330b7b2c48be2f9d5307ce754315ecc18df9830c24956d2f2e699652eac", &(0x7f0000000500)="ec419721fbcdfe130b7ed61606614d11de202d324ac0dda4141ea3b62b513930f74a4c7c99b48bfca3d6f2b38a59fd914ef6976700d08fe256bc74f2357a164a0ee1c5c0970d817da082dfb824caff6137b0c731dcb290b6044c6e939c59d7fe6726d4c16bce4053e0196c39cc15255b5ba3db5b6220e7ff0ab3c5b95ddaf495df81bdd1debd58e0aa5968f5256f4dd49d5d95ff70c428d0b17ece7e523f35f524d009a6be3075c0129bea", &(0x7f00000005c0)="35eee346f11dd976082c8abba82e0235f0ee151976bd77d773aad6490befe9009c2892a661998ff00c03f834a9460012f8ba9881ca149786d51fdcedc5b87e128c89bb51589314c208045d74f54868552a44390631731c079bc0d89ce84a4eaa5a7b2ae730050a1556a69b2f42b4c18dc62e0868b44979379b3ce479b51bc48f907530e71c9f734da709e6852169aadfc8b93cf190d8fb7ce0f1b75a1143460b7df5535af1e1bd8fe7c0ac97db0badb3a479c07b6736991afdf48df69ce59ed1c8ae9b1644cc68f252503bd2c2c78b89b6d7565a6440b25c1652254bf2626b9f5ef5872694c831cd689192351bbf72", &(0x7f00000006c0)="64bc21e8ab4b52fe654b6b0a6cbb0f04f53fb80ece057b511c08c0e1220171a823f25198054926a67b72d3c3a8212f2a7873042dfb321d3180eb8654e706489b31728ff7d2958cf15d1a8182592f060df0be9f11b0db578cc8b8850cd9e6f4b96500945372ec5d718c69f93c7f2f890de25de76783c3ba35ba508640154b2b6f1b7fc320", &(0x7f0000000780)="626856067741fb5d82b550ee8299849415ddf3c4ca0d7223c12de2aca7826d22d886"]}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x1, 0x4, 0x2, 0x7f, 0x0, 0x8000, 0xa0, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xef63, 0x1, @perf_config_ext={0x9, 0x1}, 0x200, 0x6, 0xfffffffa, 0x9, 0x62a, 0x9, 0xff00}, r3, 0xe, r10, 0x2) [ 301.664242][T13320] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:46:55 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0xa2a5, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="50010400000000000000000000001400ba61b9509ed64f3ea298f97d6b8e9c000000001396cfd1f641dfc7487d63e3d9485037c16f92f08bbab4dedc7de3393f67a54f", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x200}}, 0x0) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6815, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492919, 0x0) 12:46:55 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x2) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000080)=0x80, 0x80400) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000000c0)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002e40)=[{{&(0x7f00000001c0)=@rc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000240)=""/168, 0xa8}, {&(0x7f0000000300)=""/84, 0x54}, {&(0x7f0000000380)=""/247, 0xf7}], 0x3, &(0x7f00000004c0)=""/135, 0x87}, 0x8772}, {{&(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000600)=""/160, 0xa0}], 0x1, &(0x7f0000000700)=""/249, 0xf9}}, {{&(0x7f0000000800)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000880)=""/33, 0x21}], 0x1, &(0x7f0000000900)=""/157, 0x9d}, 0xff}, {{&(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/250, 0xfa}, {&(0x7f0000001b40)=""/24, 0x18}, {&(0x7f0000001b80)=""/82, 0x52}, {&(0x7f0000001c00)=""/14, 0xe}, {&(0x7f0000001c40)=""/165, 0xa5}, {&(0x7f0000001d00)=""/51, 0x33}, {&(0x7f0000001d40)=""/142, 0x8e}, {&(0x7f0000001e00)=""/63, 0x3f}, {&(0x7f0000001e40)=""/134, 0x86}], 0xa, &(0x7f0000001fc0)=""/96, 0x60}, 0x100}, {{&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000002100)=[{&(0x7f00000020c0)=""/46, 0x2e}], 0x1, &(0x7f0000002140)=""/28, 0x1c}, 0xffff218c}, {{&(0x7f0000002180)=@alg, 0x80, &(0x7f0000002300)=[{&(0x7f0000002200)=""/233, 0xe9}], 0x1, &(0x7f0000002340)=""/201, 0xc9}, 0x7fffffff}, {{0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f0000002440)=""/211, 0xd3}, {&(0x7f0000002540)=""/205, 0xcd}, {&(0x7f0000002640)=""/72, 0x48}, {&(0x7f00000026c0)=""/60, 0x3c}, {&(0x7f0000002700)=""/130, 0x82}, {&(0x7f00000027c0)=""/97, 0x61}, {&(0x7f0000002840)=""/91, 0x5b}, {&(0x7f00000028c0)=""/187, 0xbb}, {&(0x7f0000002980)=""/20, 0x14}], 0x9, &(0x7f0000002a80)=""/225, 0xe1}}, {{&(0x7f0000002b80)=@caif=@rfm, 0x80, &(0x7f0000002d40)=[{&(0x7f0000002c00)=""/56, 0x38}, {&(0x7f0000002c40)=""/187, 0xbb}, {&(0x7f0000002d00)=""/41, 0x29}], 0x3, &(0x7f0000002d80)=""/180, 0xb4}}], 0x8, 0x0, 0x0) write$nbd(r1, &(0x7f0000003040)={0x67446698, 0x0, 0x0, 0x3, 0x2, "239624e5936b0cefac273f0c43a75d27d5656e107b274270d8e17afcc46b44ecbea073393afa2a5ffd10f9a32eddfeb0b7a8e474cd03df0861e030a519e3a5156398aa182d436fe64aa2791811a83f265efbbbc7681499a7d931b9bbcfe608f104fbb9c4b2bcc165afffd34042add7d62e8bbec547d401b1e5774db5af78c774e17f69a2a1f380d0b36bf652d9c5c9de83285c"}, 0xa3) clock_gettime(0x0, &(0x7f0000003140)={0x0, 0x0}) utimes(&(0x7f0000003100)='./file0\x00', &(0x7f0000003180)={{r2, r3/1000+30000}, {0x77359400}}) r4 = openat(0xffffffffffffff9c, &(0x7f00000031c0)='./file0\x00', 0x9ddcf79ea991874f, 0x6) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000003200)) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000003240)='/dev/dsp\x00', 0x20082, 0x0) r6 = creat(&(0x7f0000003280)='./file0\x00', 0x40) r7 = fcntl$dupfd(r5, 0x406, r6) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xb4a8de0823576a7e, r7, 0x8000000) r8 = accept$inet(0xffffffffffffffff, &(0x7f00000032c0)={0x2, 0x0, @local}, &(0x7f0000003300)=0x10) getsockname$inet(r8, &(0x7f0000003340)={0x2, 0x0, @remote}, &(0x7f0000003380)=0x10) times(&(0x7f00000033c0)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000003400)=@v1={0x0, @aes128, 0x7, "254b32f22776c533"}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000003440)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x22) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000003480)='/dev/vcs\x00', 0x2, 0x0) getpeername$inet6(r9, &(0x7f00000034c0)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f0000003500)=0x1c) r10 = syz_open_dev$vcsn(&(0x7f0000003540)='/dev/vcs#\x00', 0x2, 0x200) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r10, 0x84, 0x75, &(0x7f0000003580)={0x0, 0xf73}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f00000035c0)={0x0, 0x0, 0x8}, &(0x7f0000003600)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f0000003640)={r11}, &(0x7f0000003680)=0x8) r12 = fanotify_init(0x4, 0x10d1a9289ab47c2d) fstat(0xffffffffffffffff, &(0x7f00000036c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getegid() fchown(r12, r13, r14) 12:46:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) 12:46:56 executing program 0: io_setup(0x200, &(0x7f0000000180)=0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x5800014, 0x10010, r1, 0x29611000) r2 = socket$kcm(0x2b, 0x1, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) r4 = accept$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) listen(r4, 0xfffffff8) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r5, 0x0) getpeername$netlink(r5, &(0x7f00000001c0), &(0x7f0000000200)=0xc) io_submit(r0, 0x2, &(0x7f00000006c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xff, r1, &(0x7f0000000380)="f31ba7f5b9f1567e61e674124433664eae5f95b3ab08a06bee9ee7d5992a1a730b51f5868d8fe0ac05f168f92502584962e7cd4d586a1ac800000000712e4a855c0ef37982ed9b36312487cbeb9e607ba712021f6d2829e82cce1ca59dfdad0a75ec84f60abec15b98e944f66c48da94cb49279fc8a2d317f1fdefc1077afff3520525316f93cdfbfdf2ad0300000065ce342879f05abc594af91e83102f7f37128a1a940d472262ab65a8232b7e239c2440254952b855a8d504fde12a33303b99038317ad695ff458bdf303bc36ee747d2ce5de6a83e20a2adc2dac1d68520b5ea478083ea2dc6c0f2a", 0xea, 0x800}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x1, r2, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x3}]) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) 12:46:56 executing program 2: ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x284) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r2, r2}, &(0x7f00000002c0)=""/83, 0xfffffffffffffcd0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000900)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f0000000940)=""/66, &(0x7f00000009c0)=0x42) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={r2, 0x8c, 0x3f}, &(0x7f0000000040)={'enc=', 'raw', ' hash=', {'wp384-generic\x00'}}, &(0x7f00000002c0)="ddede3b0124aa0746d70ad5ca28fa3ca0b6a3b232d2904b42cda75d7b48dea459e07e90310908ad0cedfbbfd364052798fa47c0d59e83574598176c54046e9e0cabdfc902d2710690dd8159ca1995ba412ee53acbc3794422aff2ed6f4c484fd4bffba6acea699635defe3ca3c0d0e3c98facd43e9d24ca6620be084f1144387efc620cdd571c94d4285ab3a", &(0x7f00000000c0)=""/63) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x30, 0x16, [{0x2c, 0x1, [@IFLA_VF_MAC={0x28, 0xd, {0x0, @random="f570fd5f7ce7"}}]}]}, @IFLA_GROUP={0x8}]}, 0x58}}, 0x0) [ 302.016838][T13340] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. [ 302.194857][T13344] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 12:46:56 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000240)) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0xffffffffffffffff, &(0x7f0000000280)) r2 = syz_open_dev$sndtimer(&(0x7f00000003c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000400)={0x3, 0x0, 0x0, 0x3, 0xffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x38, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_redirect(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000340)='./file0\x00', 0x8, 0x2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x400, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr="1815c10de853b16c01857322db0c2a2d"}, 0x4) listen(r4, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r6 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r5, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x2}]) fgetxattr(r6, &(0x7f0000000040)=ANY=[@ANYBLOB="6f73322e2f6465762f736e617073686f74231be4f8c08e821300"], &(0x7f0000000100)=""/244, 0xa1) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000380)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) sendto$inet6(r3, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 12:46:56 executing program 0: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x2200, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000340), 0x4) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r3, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x58) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x2, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$IOC_PR_RELEASE(r4, 0x401070ca, &(0x7f0000000080)={0xa8, 0x6}) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x2, 0x0, 0xfffffdac) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8642957429963afb, @perf_bp={0x0, 0x8}, 0x10080, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$KVM_RUN(r5, 0xae80, 0x0) 12:46:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) 12:46:56 executing program 2: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0)=0x1, 0x4) r0 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000440)={'s9z', 0x2}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r1, 0x3b70, &(0x7f0000000140)={0x10}) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r0, r0}, &(0x7f0000000040)=""/83, 0xffffffffffffff38, 0x0) [ 302.516136][ C0] sd 0:0:1:0: [sg0] tag#6473 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 302.526721][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB: Test Unit Ready [ 302.533378][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.543255][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.553141][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.562941][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.572841][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.582590][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.592370][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.602233][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.612024][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.621782][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.631600][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.641306][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.651077][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.660939][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 302.670745][ C0] sd 0:0:1:0: [sg0] tag#6473 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 12:46:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) [ 302.915438][T13362] IPVS: ftp: loaded support on port[0] = 21 [ 303.092724][ C0] sd 0:0:1:0: [sg0] tag#6474 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 303.103338][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB: Test Unit Ready [ 303.109923][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.119718][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.129483][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.139250][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.148997][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.158742][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.168596][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.178373][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.188130][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.197889][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.207934][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.217679][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.227474][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12:46:57 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x20}, 0x6}, 0x1c) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000540)=0x18, 0x4) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x1, 'veth1_to_team\x00'}) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008100)=[{0x18, 0x29, 0x3b, "16d3"}], 0x18}}], 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f00000004c0)={0x3, 0x1, 0x18, 0x1b, 0x5d, &(0x7f00000000c0)}) [ 303.237229][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.246975][ C0] sd 0:0:1:0: [sg0] tag#6474 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 12:46:57 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$VIDIOC_G_CROP(r2, 0xc01456b8, &(0x7f0000000080)={0x0, {0x14, 0x14}}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x40000, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x200001, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000004c0), 0x12) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB, @ANYBLOB="0300503fd475dca2ee796a21b10e7d62ff884b730c1f386bebacf3e11a39a4e4750089a274769c440dc8cb7a23a39f9546e8a385f86ea0070db354e9df0e80cc0d6ec16de9cd3bd0da2ef6e2223e9bf032d7419edefd338083bcd251b79a8894f7208ca19d88601fd5", @ANYRES32=0x0, @ANYRESDEC], 0x6, 0x1) syz_open_dev$amidi(0x0, 0x0, 0x0) gettid() syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_CROP(r4, 0xc01456b8, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x1f, 0x101000) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) dup(0xffffffffffffffff) writev(r5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001880)='0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) close(0xffffffffffffffff) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) r10 = dup3(r7, r8, 0x0) dup2(r10, r9) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x80000) socket$inet6(0xa, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r11, &(0x7f0000000240), 0x0) 12:46:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) [ 303.403540][T13362] chnl_net:caif_netlink_parms(): no params data found [ 303.584884][T13362] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.592223][T13362] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.601036][T13362] device bridge_slave_0 entered promiscuous mode [ 303.708943][T13362] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.716562][T13362] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.725561][T13362] device bridge_slave_1 entered promiscuous mode [ 303.775914][ T1763] tipc: TX() has been purged, node left! [ 303.845009][T13362] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 303.860290][T13362] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 303.940853][T13362] team0: Port device team_slave_0 added [ 303.965223][T13362] team0: Port device team_slave_1 added [ 304.019590][T13362] device hsr_slave_0 entered promiscuous mode [ 304.043060][T13362] device hsr_slave_1 entered promiscuous mode [ 304.049993][T13362] debugfs: Directory 'hsr0' with parent '/' already present! [ 304.132284][T13362] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 304.145881][T13362] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 304.172397][T13362] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 304.238933][T13362] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 304.366047][T13362] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.373308][T13362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.381016][T13362] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.388272][T13362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.407470][ T630] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.418494][ T630] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.667007][T13362] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.717175][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 304.726060][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.740940][T13362] 8021q: adding VLAN 0 to HW filter on device team0 [ 304.767690][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.777266][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.786271][ T630] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.793696][ T630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.872666][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.886958][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.895965][ T630] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.903175][ T630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.911791][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 304.922018][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 304.932042][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 304.941863][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 304.951404][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.961669][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.971289][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.980605][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.998205][T13362] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 305.011202][T13362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 305.028283][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 305.037970][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 305.047412][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 305.086786][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 305.094962][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 305.115835][T13362] 8021q: adding VLAN 0 to HW filter on device batadv0 12:46:59 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) memfd_create(&(0x7f00000001c0)='#! ', 0x2) socket$inet(0x2, 0x80001, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 12:46:59 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xeb) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f00000001c0)='rw\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068900ac1414cfe04000013c31b47d0510c147885b6e000000007ec921f605a0569e18", 0x2c}], 0x1, 0x0, 0x0, 0x50}, 0x0) 12:46:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) 12:46:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) unshare(0x24020400) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)=0x48000) close(r1) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) 12:46:59 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r1, &(0x7f0000000600)="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", &(0x7f00000007c0)=""/237}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r2 = socket(0x15, 0x80005, 0x0) getsockopt(r2, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f00000000c0)=""/146) 12:46:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'syzkaller1\x00', @ifru_addrs=@rc={0x1f, {0x3f, 0x9, 0x80, 0x9, 0x41, 0x7f}}}}) syz_emit_ethernet(0x22c, &(0x7f0000000980)=ANY=[@ANYBLOB="395d3fd49a290180c20000ba34004500001c000000000002907800000000ffffffdf16009078e0000002"], &(0x7f0000000180)) 12:46:59 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000540)=0x1c, 0x7fffc) write$binfmt_script(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x16c) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x150) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x41, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffffffffffffe) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000380)=0x9) r3 = syz_open_dev$midi(0x0, 0x9e7e, 0x1201c2) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}], 0x10) r5 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r5, 0x0, 0xe, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}], 0xd7) bind$inet6(r4, &(0x7f0000000500)={0xa, 0x4e23, 0x1, @local, 0x72}, 0x1c) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) write$P9_RLOPEN(r1, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r2, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r7 = socket$inet6(0xa, 0x5, 0x53) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f00000003c0), 0x0) getsockopt(r7, 0x1, 0x8, &(0x7f0000000480)=""/126, &(0x7f0000000040)=0x7e) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66798443ebb34241d50d9b4f08b8b643119d7acca61db9ab696c653020acf5a5a84e3ef82a7070703120285b292120282d2d6574682623290a545d4d56448e9826a1bc64dba2855056fc5dd2e6e9d770ce06cdbbb23f61f66c7ee58cafe01c2f006510845938d17b3fcbbc14c459051d5cd6ca8e000000008da8d7e618bc2f081215d819ac5e01442026416db5376f524700"/166], 0x99) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:46:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x106, 0x9}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lseek(r4, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)={r5, 0x0, 0x0, "b1"}, 0x200000c9) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=r5, @ANYBLOB="b3000000fe020000000000000034e300278388f2a1816605787304f9ace25900731051e1dc23fc135fb60af25b7e1b1d991dd1c58f951669b1937b868370c83400209692cb2054f7de88c9aad9b4431390e65a3d72a95fc7268641edd4f214b7d6e9b0010938b0209d51171ab14987c04f5d93c7e31d0461abaae1c273d283d40b47f46593edeaaab401ca1c446100"/156], &(0x7f00000000c0)=0x2) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000000)={r5, 0x940c, 0x3}, 0x8) 12:46:59 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r1, &(0x7f0000000600)="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", &(0x7f00000007c0)=""/237}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r2 = socket(0x15, 0x80005, 0x0) getsockopt(r2, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f00000000c0)=""/146) 12:47:00 executing program 2: sysinfo(&(0x7f0000000040)=""/22) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x8300, 0x28) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000380)}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r4, 0x0) recvmsg(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000080)=""/85, 0x55}, {&(0x7f0000001500)=""/4096, 0x1000}], 0x3, &(0x7f0000002500)=""/97, 0x61}, 0x8041) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) stat(0x0, 0x0) r5 = socket$inet(0x10, 0x2, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) ioctl$sock_ifreq(r5, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) 12:47:00 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r1, &(0x7f0000000600)="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", &(0x7f00000007c0)=""/237}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r2 = socket(0x15, 0x80005, 0x0) getsockopt(r2, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f00000000c0)=""/146) 12:47:00 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYRES32=r4, @ANYBLOB="2c06d80b503aae95100a5d00100000b1"], 0x200000c9) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x4, 0xffff, 0x0, 0x9c, 0x1000, 0xffffffff, 0x1, 0x3, r4}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x63}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r5, 0x3ff, 0x3, [0x4, 0x61, 0x1f]}, 0xe) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x10000, 0x0) mmap$perf(&(0x7f00006aa000/0x1000)=nil, 0x1000, 0x2000000, 0x20010, r6, 0x1) vmsplice(r1, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2000000000002) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r7, 0x0) accept4$unix(r7, &(0x7f0000000040), &(0x7f00000000c0)=0x6e, 0x81000) 12:47:00 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x8000, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.redihect\x00', &(0x7f0000000300)='./file0\x00', 0x450, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x100000000) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f000000b000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 12:47:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r4, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3400000066000700000000bf7c00000400000000", @ANYRES32=r3, @ANYBLOB="80001b030000ffffbd0000000cb40100677265640000000004000200"], 0x34}}, 0x0) [ 306.458516][T13456] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 306.526165][T13456] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 12:47:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:00 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r1, &(0x7f0000000600)="eeed62000000003c6fc20579522d8d86de77c17dc4cb7ed6f26cef098334742de7d72b6ca9559b2ad8b9764d16e9904112e40e9bf7dba3e23d30bb794976481d441c3e64b62ab6e05945bab74d7ade4df30bbbd71f6914fc8f6131bd6e974eb639cc6950013105767d825ddec1e0ffdeabe8595a9b35d6a0931c976b69ce3c03e19cc078738736e991bcf8b1ee5552b75bc4a1c63200ae75ef6254f038d39e0d7cd3e544fcbf621cd0835fec87938f465c6096aae0008802fd493dbea636450c9140d4ae5579481d5f32c181db4bb1dfe02cf35cae296eb97b648828f14f93bbfb37cbc8d1b12f8e807e348d44fc8d4ffe38889e0168ef38ee3fc1309fb99ee424c250d12bbb73b2c971379626d2a65dd9ea6f0a502317f45eadd79a69c686a8623faa8557585c1d2dcc3c47f9603d061405dbd3ae476084799361b2f159c4d285057d6cbe4584ad30c7a0e7b932492965644780d5abd53ca281c7d6523d592090eb48f33bf188d0400f78fa58de5c521fcca29929cfa770f1e55e35a2fe46bc58e4358d2bbd93b3361cc19ff7c23cc8c455816cfdabda64341c3e331d2da0bff3e5bdd749d48a0dcca70d226faa", &(0x7f00000007c0)=""/237}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r2 = socket(0x15, 0x80005, 0x0) getsockopt(r2, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f00000000c0)=""/146) 12:47:00 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @dev}, 0x1c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={r4, 0xff800000}, 0x8) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getgroups(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 12:47:00 executing program 1: pipe(&(0x7f0000000680)) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, 0x0, 0x0) memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) syz_open_dev$sndseq(0x0, 0x0, 0x1) ppoll(&(0x7f0000000200)=[{}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', 0x0, 0x0, 0x1) r2 = socket(0xa, 0x3, 0x8) syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="99a3c6753de6514f5ddb7494cc5c26457a586c18d3bbd08c803c74da7ff700678a68e2e2b5b48b864a9d23a132a79104fac363b87d569c7c7d6755ffa194d4d8357d7bd90335f6105753d5a8fc8d27ad7020a823461d75cd2ea887dee9e589d940f37d3625d9f3369c76ffc87c3a1cf88096349eaef4c5502a0a765b53037434cf35eed878cdb021775511cf0982be9105859771a9d450511141581fd0c586fc24b56d2e5f1fd3739c741933d1756659b1375f42ce"]}}, 0x20004850) r3 = memfd_create(0x0, 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) dup2(r4, r3) r5 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) ioctl$SG_GET_REQUEST_TABLE(r6, 0x227d, &(0x7f0000000780)) ptrace$setopts(0x4206, r5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r8 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r9 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r9, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r8, 0x4c00, r9) sendfile(r7, r8, 0x0, 0x102000004) 12:47:01 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lseek(r1, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)={r2, 0x0, 0x0, "b1"}, 0x200000c9) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=r2, @ANYBLOB="b3000000fe020000000000000034e300278388f2a1816605787304f9ace25900731051e1dc23fc135fb60af25b7e1b1d991dd1c58f951669b1937b868370c83400209692cb2054f7de88c9aad9b4431390e65a3d72a95fc7268641edd4f214b7d6e9b0010938b0209d51171ab14987c04f5d93c7e31d0461abaae1c273d283d40b47f46593edeaaab401ca1c446100"/156], &(0x7f00000000c0)=0x2) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, &(0x7f0000000140)=0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000040)) r3 = socket$inet6(0xa, 0x80805, 0x0) sendmmsg$inet6(r3, &(0x7f0000003180)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="8a5eff487343a5b580df2dc7c18cd3b2"}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000100)="18", 0x33c00}], 0x1}}, {{&(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000004c0)=[{&(0x7f00000003c0)="8f", 0x1}], 0x1}}], 0x2, 0x0) preadv(r3, &(0x7f0000001600)=[{&(0x7f0000000180)=""/196, 0xc4}, {&(0x7f0000000280)=""/52, 0x34}, {&(0x7f00000002c0)}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/220, 0xdc}, {&(0x7f0000000300)=""/29, 0x1d}, {&(0x7f0000000400)=""/133, 0x85}], 0x7, 0x1) [ 307.212141][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 307.218417][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 307.343731][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 307.350985][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:47:01 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r1, &(0x7f0000000600)="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", &(0x7f00000007c0)=""/237}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r2 = socket(0x15, 0x80005, 0x0) getsockopt(r2, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) [ 307.577520][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 307.583716][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:47:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000), 0x0) 12:47:01 executing program 1: sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x6815, 0xd2efff7f00000000, &(0x7f0000000100), 0x0, &(0x7f0000000700)=[@assoc={0x18, 0x117, 0x4, 0x2}, @assoc={0x0, 0x117, 0x4, 0x3}, @assoc={0x18, 0x117, 0x4, 0x8}, @assoc={0x18, 0x117, 0x4, 0x5}, @iv={0x0, 0x117, 0x2, 0x0, "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"}, @iv={0x38, 0x117, 0x2, 0x1e, "504faaeee9edea7dbae6b3f61820bb94d3cf499200bfcfaa594555221472"}], 0xe8, 0x4000}], 0x1, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000)={{0x58816151}, 0x20}, 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 12:47:01 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r1, &(0x7f0000000600)="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", &(0x7f00000007c0)=""/237}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r2 = socket(0x15, 0x80005, 0x0) getsockopt(r2, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) 12:47:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x1d, 0x12, 0xdd, &(0x7f0000000280)="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"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0xfffffffffffffd01}, 0x48) 12:47:02 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @dev}, 0x1c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={r4, 0xff800000}, 0x8) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getgroups(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 12:47:02 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r1, &(0x7f0000000600)="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", &(0x7f00000007c0)=""/237}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r2 = socket(0x15, 0x80005, 0x0) getsockopt(r2, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:02 executing program 1: socket$inet(0x2, 0x2000080001, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) r7 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r7, 0x801c581f, &(0x7f0000000200)={0x3, 0x800, 0x1a7, 0x4}) r8 = openat(r6, &(0x7f0000000140)='./file0\x00', 0x8000, 0x20) getsockname$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r9}]]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4004008}, 0x28804) 12:47:02 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000040)=0x2, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) write$P9_ROPEN(r1, &(0x7f0000000100)={0x18, 0x71, 0x2, {{0x8, 0x4}, 0xff}}, 0x18) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) 12:47:02 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r1, &(0x7f0000000600)="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", &(0x7f00000007c0)=""/237}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x179, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000800010000ce204b707596906260a7cefc"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0x6, 0x45d}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 12:47:02 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r1, &(0x7f0000000600)="eeed62000000003c6fc20579522d8d86de77c17dc4cb7ed6f26cef098334742de7d72b6ca9559b2ad8b9764d16e9904112e40e9bf7dba3e23d30bb794976481d441c3e64b62ab6e05945bab74d7ade4df30bbbd71f6914fc8f6131bd6e974eb639cc6950013105767d825ddec1e0ffdeabe8595a9b35d6a0931c976b69ce3c03e19cc078738736e991bcf8b1ee5552b75bc4a1c63200ae75ef6254f038d39e0d7cd3e544fcbf621cd0835fec87938f465c6096aae0008802fd493dbea636450c9140d4ae5579481d5f32c181db4bb1dfe02cf35cae296eb97b648828f14f93bbfb37cbc8d1b12f8e807e348d44fc8d4ffe38889e0168ef38ee3fc1309fb99ee424c250d12bbb73b2c971379626d2a65dd9ea6f0a502317f45eadd79a69c686a8623faa8557585c1d2dcc3c47f9603d061405dbd3ae476084799361b2f159c4d285057d6cbe4584ad30c7a0e7b932492965644780d5abd53ca281c7d6523d592090eb48f33bf188d0400f78fa58de5c521fcca29929cfa770f1e55e35a2fe46bc58e4358d2bbd93b3361cc19ff7c23cc8c455816cfdabda64341c3e331d2da0bff3e5bdd749d48a0dcca70d226faa", &(0x7f00000007c0)=""/237}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0xb, 0x0, &(0x7f0000000080)=0xfffffef2) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r5 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) io_submit(r4, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r3, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000003740)={0x0, 0xfffffec3, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYRESDEC=r5, @ANYBLOB="000000000000000000939e071c0012000c000180620002000800140001000010000000000000000000000004000000000000000093b9e3a499c853be27dc9ff7d6dc000000000000000000"], 0x3}}, 0x0) 12:47:02 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x50, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087715082cf0400b0eb04002800160011000586f9835b3f2f009148790028f85acc7c45", 0x2e}], 0x1}, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8}, 0x56e2fd6808af66cb) gettid() gettid() r3 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r3, 0x80044944, &(0x7f00000000c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r4, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000001c0)=0x40000000, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000007150533a3f163150e2fd042a87a4d171aef133e8c71f2e902d28409ca6c8c079136bba63e12e5ccbd79c9c9c6e53f5de28527affbff8b6c21a7c288f678bbd487458bce43f5c005b878d149af90053fb", @ANYRES32=r7, @ANYBLOB="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"], 0x48}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000380)={0x1d, r7}, 0x10) r8 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r8, 0x0, 0x48f, &(0x7f0000000340)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x0, 'lBO(\xac)v\xfb\x00?M\x00', 0x8, 0x1}, 0x2c) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYRES64=r3, @ANYRES64, @ANYRESOCT, @ANYRESOCT=r0], 0x3e) perf_event_open(0x0, 0x0, 0x0, r1, 0x6) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, r1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.swap.current\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 12:47:03 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000040)) syz_emit_ethernet(0x46, &(0x7f0000000100)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x10, 0x73, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, {[], @udp={0x0, 0x0, 0xffffffffffffff94, 0x0, [], "5d2a49439b267a31"}}}}}}, 0x0) [ 308.915252][T13533] IPVS: set_ctl: invalid protocol: 0 172.30.0.2:20004 12:47:03 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r1, &(0x7f0000000600)="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", &(0x7f00000007c0)=""/237}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x5, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0x2f}, [@ldst={0x7, 0x0, 0x31}]}, &(0x7f0000003ff6)='OPL\x00', 0x1001, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x78) 12:47:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge0\x00\x00\x00\x01\xd8\x00'}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0xffff, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = dup2(r1, r1) sendto$inet(0xffffffffffffffff, 0x0, 0xd1, 0x200007fd, &(0x7f0000e68000)={0x2, 0x2000000004e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$inet(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000340)="aac05611d5548018023b", 0xa}, {&(0x7f0000000380)="efdc03ea015109017f677c8178b729440504a218e49539c6ab6bdb64bc5ba4303bfeca61be8d0424e1035bf8db4ad31ebcc4e9606d0f51c86817c428e51d7b45adbadcad4e07dcfee0d60ead6cb9cbbf5ec9a1596da355fc6a9380523a46b335ae5f4d152dd0bba0015b75cff5fd242f170bb4ffb46b6eefbe1f092dd4c82ee1005b64afde3a73803d76dfe9c0501ef4c88271af1199cba4c7839336c1b6725ce52fb84ab9d6547a8110abdc5addeb4aaf27fa6ec8be4674cd6d525dab9755b6c953594eeff6c6b91657e10d06a5ad10a850af13802de695bbf2bb0264f716565f2b21b86fcda78df3d9b2137a43da623ec0d40bba01e7", 0xf7}, {&(0x7f0000000480)="f7ecd4204e4a37cfac6c3ada948086738c6e3f6260e58c91a0000f979b66019af2de18dc8dfaaa3c7ad6020a3bb4aa8a760762a636aa42a8b99e3bb23fa08d5e38f1f2608afc214a6980196b", 0x4c}, {&(0x7f0000000500)="82403335fe3e568eeaaf6906330498a30566842c80b0a4313060532ceed38e1529be353baafd830aaf782e5cefceaecf13526054180267532e9045902f8861648c9ce07c7cf33170e08ac5a1970697ea53ad25a6021146708b43263bb98ad595bf6a9bfaf8898dc021d6513b", 0xf5}, {&(0x7f0000000580)="9f7f743bf058ffd5330d3c307400d1f7d8485419875d22f6ad06f1a04d3e9d68da3f8ea974f2d4d80082fbdc294c90dab2bffe13b8f990e9b58496b63fdbd0a658770fab3ccaa26c7dd39013612977b97c3c34c6fd439e4a5ce1e7b5d4785d905362a31c961d2e1a3368d4bd9bb38cdfe783e391e45c1e99129e9233c045f96b68e7f69af69be9bfa3ac16ef33901a01d2bf4cfa239d2bf42ad62b419b8a85847cfd89f52e3292d4b1bb103484ff1f86de3c56c5b5a8d34845e966b47ffaf08e7a91dfda3981d510", 0xc8}, {&(0x7f0000000680)="14afb22b0b2eaa2836be2c3d8efd55e2f7f07928b481fef8c2a0ec4c8ed8cd7d96e66df80019de72c1701011e4b1ca91b6f4691612a4e2ae2d38ec0e370321f7761326144e6a39158816e1e70df19ce3ef8f17e17528e1b63e235111b5cfdbc1", 0x60}, {&(0x7f0000000c00)="ba284ff992e69d5a71320c75f4f0585d45f5bfd12a5575186dce508d935552b603536a8927155294774158d2a89e4426cf99df5d53f9689eb630d6ab9b32f516796a96f90fb4c4e7cc429b614e6a798d6f8e43df9939f1107dd609df451f2799f80de5acc158d9b76ff479a5931cfa", 0x6f}, {&(0x7f0000000700)="4c4d4edf3138e8653d93f3f0a645267975a3823b7ddc44712d9e212445531cb3c2f2a5d5e8ae04dc", 0x28}], 0x8, &(0x7f0000000d80)=[@ip_retopts={{0x70, 0x0, 0x7, {[@ssrr={0x89, 0x17, 0x7f, [@broadcast, @remote, @remote, @local, @empty]}, @end, @cipso={0x86, 0x22, 0x401, [{0xc, 0xe, "259e5ff5d12b3e44c288fd48"}, {0x0, 0xe, "778c7be8213c7f49a76f8f57"}]}, @ra={0x94, 0x6, 0x31788d2}, @ra={0x94, 0x6, 0x6}, @timestamp={0x44, 0x18, 0x5, 0x1, 0x2, [{[@broadcast], 0x400}, {[], 0x5cd}, {[], 0x3}, {[], 0x3}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80000001}}], 0xa0}, 0x14) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x204040, 0x0) ioctl$VIDIOC_S_TUNER(r3, 0x4054561e, &(0x7f00000002c0)={0x3f, "f828505f921a94d03e566f75d27731e7ce116f7efb12aa1809673d042a17d61c", 0x1, 0x20, 0xeb7, 0x1, 0x4, 0x94837429346435c3, 0x5, 0x1}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000000c0)={r6, 0x0, 0x4}, 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000e80)={r6, 0x10000}, &(0x7f0000000ec0)=0x8) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$tipc(r7, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="fe", 0x1}], 0x1}, 0xddd9dd440027b2b1) sendmsg$tipc(r2, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="fe", 0x1}], 0x1}, 0xddd9dd440027b2b1) accept4$inet(r2, 0x0, &(0x7f0000001ac0), 0x80000) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/zero\x00', 0x100001, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, 0x0, 0xfffffffffffffea6) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000740)=ANY=[@ANYBLOB="090000000000000002004e24ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e23ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e230000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e207f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1e010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e227f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac14140d00bd35982b405b9d7072b200000000000000000000000000000000000000000000002400"/1178], 0x490) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000001c0)=0x44) r10 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00\xff\xff\xfd\xfd\x00\x00\x00z', 0xfff7ffffffffffdb}) [ 309.350380][T13551] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.358316][T13551] bridge0: port 1(bridge_slave_0) entered disabled state 12:47:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) dup(r0) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) r1 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:03 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000600)="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", &(0x7f00000007c0)=""/237}, 0x20) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:03 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='..//\x00') r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x513100, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x349280e05390a33}, 0x10) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000240)={0x80000000}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r6 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r7, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) r10 = memfd_create(&(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0) r11 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r11, 0x0) r12 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lseek(r12, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)={r13, 0x0, 0x0, "b1"}, 0x200000c9) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r12, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=r13, @ANYBLOB="b3000000fe020000000000000034e300278388f2a1816605787304f9ace25900731051e1dc23fc135fb60af25b7e1b1d991dd1c58f951669b1937b868370c83400209692cb2054f7de88c9aad9b4431390e65a3d72a95fc7268641edd4f214b7d6e9b0010938b0209d51171ab14987c04f5d93c7e31d0461abaae1c273d283d40b47f46593edeaaab401ca1c446100"/156], &(0x7f00000000c0)=0x2) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r11, 0x84, 0x71, &(0x7f00000000c0)={r13, 0x1}, 0x8) io_submit(r9, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r8, 0x0, 0xffffffffffffff66, 0x0, 0x0, 0x2}]) io_submit(r5, 0x2, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, r8, 0x0, 0x217, 0x1822e7e2, 0x0, 0x2}]) perf_event_open(0x0, 0x0, 0x5, r4, 0x0) r14 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r14, 0x0) write$FUSE_INTERRUPT(r14, &(0x7f0000000280)={0x10, 0xfffffffffffffffe, 0x4}, 0x10) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000080)={0x1, 0x3b94b76, 0x1f, 0x1}) 12:47:03 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r5, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) r7 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lseek(r7, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000000c0)={r8, 0x0, 0x0, "b1"}, 0x200000c9) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r7, 0x84, 0x6c, &(0x7f0000000000)=ANY=[@ANYRES32=r8, @ANYBLOB="b3000000fe020000000000000034e300278388f2a1816605787304f9ace25900731051e1dc23fc135fb60af25b7e1b1d991dd1c58f951669b1937b868370c83400209692cb2054f7de88c9aad9b4431390e65a3d72a95fc7268641edd4f214b7d6e9b0010938b0209d51171ab14987c04f5d93c7e31d0461abaae1c273d283d40b47f46593edeaaab401ca1c446100"/156], &(0x7f00000000c0)=0x2) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000000500)={r8, 0x5f, "aa430696f2204044e13282d2a4e705c3668fcc5dfee368e8bc645f6a5b30616005d5f4c4b0cc3fd13a59b724d9a3413f7ef3d1c708cadda58c9995add6e3a7790b9c8d33f411cc67e2ae053ae10cfa666dafb9e3f6eb32024576b5e45fd2b9"}, &(0x7f0000000580)=0x67) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r10 = getpid() perf_event_open(0x0, r10, 0x1, r9, 0x0) recvmsg$can_raw(r9, &(0x7f0000002500)={&(0x7f0000002280)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002480)=[{&(0x7f0000002300)=""/85, 0x55}, {&(0x7f0000002380)=""/140, 0x8c}, {&(0x7f0000002440)=""/1, 0x1}], 0x3, &(0x7f00000024c0)=""/61, 0x3d}, 0x40000031) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r14, 0x10aec61bc6caa7b3}}, 0x20}}, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000002580)={0x0, @ethernet={0x306, @remote}, @can={0x1d, r14}, @hci, 0x2, 0x0, 0x0, 0x0, 0x8, &(0x7f0000002540)='teql0\x00', 0x2, 0x0, 0xa22b}) sendmsg$nl_route(r5, &(0x7f0000002680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000002640)={&(0x7f0000002600)=@ipv6_getnetconf={0x3c, 0x52, 0x500, 0x70bd2b, 0x25dfdbfc, {}, [@NETCONFA_RP_FILTER={0x8, 0x3, 0x8}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7f}, @NETCONFA_IFINDEX={0x8, 0x1, r11}, @NETCONFA_IFINDEX={0x8, 0x1, r15}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x80000001}]}, 0x3c}}, 0x4003830) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100), 0x8) r16 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000240)=0x0) r18 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r18, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) r20 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0xfffffffffffffe01, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r16, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x164, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r17}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r18}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r19}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r20}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x164}, 0x1, 0x0, 0x0, 0x10}, 0x10000000) sendto$inet(r1, &(0x7f00003cef9f)="b7", 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 12:47:03 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000600)="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", &(0x7f00000007c0)=""/237}, 0x20) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) [ 309.623071][T13553] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.630999][T13553] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.641580][T13553] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.649679][T13553] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.665865][T13553] device bridge0 entered promiscuous mode [ 309.715298][T13564] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. 12:47:03 executing program 2: socket$caif_stream(0x25, 0x1, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x6c, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0@'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[0xfc], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @rand_addr="b6eeb94dabff920469d573bd92064dbf"}}}}]}]}, 0x6c}}, 0x0) 12:47:03 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000001d00000000000000080676657468305f746f5f627269646765006e7230000000000000000000000000006772653000000000000010000000000076657468315f746f5f626f6e64000000aaaaaaaaaaaa000000000000aaaaaaaaaaaa00000000000000007000000070000000a80000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000feffffff0000000009000000000000000000697064647030000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000067726530000000000000000000000000ffffffffffff0000000000000000000000000000000000000000e000000018010000500100007261746565737400000000000000000000000000000000000000000000000000480000000000818e51513cf1e4040000000000000000000073797a5f74756e0000000000ff0f000000000000000000000004000000000000200000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000feffffff01000000110000000000000000006272696467655f736c6176655f310000000000000000000000000000000000006c6f00000000000000000000000000000080616d300000000000000000000000aaaaaaaaaa00000000000000aaaaaaaaaaaa0000000000000000a00000000801000040010000636f6e6e6c6162656c000000000000000000000000000000000000000000000008000000000000000000000000000000434c41535349465b00000000000000000000000000000000000000000000000008000000000000000000000000000000736e617400000051000000000000000000000000000000100000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb00"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_int(r12, 0x1, 0x17, &(0x7f0000000000)=0xff, 0x4) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) setgroups(0x31dbe637, &(0x7f00000002c0)) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x60020000) fchmod(r4, 0x30) r13 = socket$alg(0x26, 0x5, 0x0) ioctl$FITRIM(r13, 0xc0185879, &(0x7f0000000100)={0x5, 0x101, 0x4}) 12:47:04 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000600)="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", &(0x7f00000007c0)=""/237}, 0x20) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) r1 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) [ 309.957234][T13551] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.964710][T13551] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.972268][T13551] device bridge0 left promiscuous mode 12:47:04 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000000)={0x80, 0xf5, 0xbb, 0x0, 0xfff, 0x9, 0x81, 0x1, 0x81, 0x0, 0x8, 0xc7, 0x0, 0x8, 0x7fffffff, 0x1, 0x0, 0x3, 0x3}) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000180)=[@in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e22, @local}], 0x20) 12:47:04 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r2 = socket(0x15, 0x80005, 0x0) getsockopt(r2, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) [ 310.215359][T13581] IPVS: ftp: loaded support on port[0] = 21 [ 310.367778][T13571] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.375160][T13571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.382980][T13571] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.390193][T13571] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.398678][T13571] device bridge0 entered promiscuous mode [ 310.423191][T13580] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. 12:47:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge0\x00\x00\x00\x01\xd8\x00'}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0xffff, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = dup2(r1, r1) sendto$inet(0xffffffffffffffff, 0x0, 0xd1, 0x200007fd, &(0x7f0000e68000)={0x2, 0x2000000004e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$inet(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000340)="aac05611d5548018023b", 0xa}, {&(0x7f0000000380)="efdc03ea015109017f677c8178b729440504a218e49539c6ab6bdb64bc5ba4303bfeca61be8d0424e1035bf8db4ad31ebcc4e9606d0f51c86817c428e51d7b45adbadcad4e07dcfee0d60ead6cb9cbbf5ec9a1596da355fc6a9380523a46b335ae5f4d152dd0bba0015b75cff5fd242f170bb4ffb46b6eefbe1f092dd4c82ee1005b64afde3a73803d76dfe9c0501ef4c88271af1199cba4c7839336c1b6725ce52fb84ab9d6547a8110abdc5addeb4aaf27fa6ec8be4674cd6d525dab9755b6c953594eeff6c6b91657e10d06a5ad10a850af13802de695bbf2bb0264f716565f2b21b86fcda78df3d9b2137a43da623ec0d40bba01e7", 0xf7}, {&(0x7f0000000480)="f7ecd4204e4a37cfac6c3ada948086738c6e3f6260e58c91a0000f979b66019af2de18dc8dfaaa3c7ad6020a3bb4aa8a760762a636aa42a8b99e3bb23fa08d5e38f1f2608afc214a6980196b", 0x4c}, {&(0x7f0000000500)="82403335fe3e568eeaaf6906330498a30566842c80b0a4313060532ceed38e1529be353baafd830aaf782e5cefceaecf13526054180267532e9045902f8861648c9ce07c7cf33170e08ac5a1970697ea53ad25a6021146708b43263bb98ad595bf6a9bfaf8898dc021d6513b", 0xf5}, {&(0x7f0000000580)="9f7f743bf058ffd5330d3c307400d1f7d8485419875d22f6ad06f1a04d3e9d68da3f8ea974f2d4d80082fbdc294c90dab2bffe13b8f990e9b58496b63fdbd0a658770fab3ccaa26c7dd39013612977b97c3c34c6fd439e4a5ce1e7b5d4785d905362a31c961d2e1a3368d4bd9bb38cdfe783e391e45c1e99129e9233c045f96b68e7f69af69be9bfa3ac16ef33901a01d2bf4cfa239d2bf42ad62b419b8a85847cfd89f52e3292d4b1bb103484ff1f86de3c56c5b5a8d34845e966b47ffaf08e7a91dfda3981d510", 0xc8}, {&(0x7f0000000680)="14afb22b0b2eaa2836be2c3d8efd55e2f7f07928b481fef8c2a0ec4c8ed8cd7d96e66df80019de72c1701011e4b1ca91b6f4691612a4e2ae2d38ec0e370321f7761326144e6a39158816e1e70df19ce3ef8f17e17528e1b63e235111b5cfdbc1", 0x60}, {&(0x7f0000000c00)="ba284ff992e69d5a71320c75f4f0585d45f5bfd12a5575186dce508d935552b603536a8927155294774158d2a89e4426cf99df5d53f9689eb630d6ab9b32f516796a96f90fb4c4e7cc429b614e6a798d6f8e43df9939f1107dd609df451f2799f80de5acc158d9b76ff479a5931cfa", 0x6f}, {&(0x7f0000000700)="4c4d4edf3138e8653d93f3f0a645267975a3823b7ddc44712d9e212445531cb3c2f2a5d5e8ae04dc", 0x28}], 0x8, &(0x7f0000000d80)=[@ip_retopts={{0x70, 0x0, 0x7, {[@ssrr={0x89, 0x17, 0x7f, [@broadcast, @remote, @remote, @local, @empty]}, @end, @cipso={0x86, 0x22, 0x401, [{0xc, 0xe, "259e5ff5d12b3e44c288fd48"}, {0x0, 0xe, "778c7be8213c7f49a76f8f57"}]}, @ra={0x94, 0x6, 0x31788d2}, @ra={0x94, 0x6, 0x6}, @timestamp={0x44, 0x18, 0x5, 0x1, 0x2, [{[@broadcast], 0x400}, {[], 0x5cd}, {[], 0x3}, {[], 0x3}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80000001}}], 0xa0}, 0x14) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x204040, 0x0) ioctl$VIDIOC_S_TUNER(r3, 0x4054561e, &(0x7f00000002c0)={0x3f, "f828505f921a94d03e566f75d27731e7ce116f7efb12aa1809673d042a17d61c", 0x1, 0x20, 0xeb7, 0x1, 0x4, 0x94837429346435c3, 0x5, 0x1}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000000c0)={r6, 0x0, 0x4}, 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000e80)={r6, 0x10000}, &(0x7f0000000ec0)=0x8) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$tipc(r7, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="fe", 0x1}], 0x1}, 0xddd9dd440027b2b1) sendmsg$tipc(r2, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="fe", 0x1}], 0x1}, 0xddd9dd440027b2b1) accept4$inet(r2, 0x0, &(0x7f0000001ac0), 0x80000) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/zero\x00', 0x100001, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, 0x0, 0xfffffffffffffea6) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000740)=ANY=[@ANYBLOB="090000000000000002004e24ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000800000002004e23ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e230000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e207f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1e010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e227f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac14140d00bd35982b405b9d7072b200000000000000000000000000000000000000000000002400"/1178], 0x490) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000001c0)=0x44) r10 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00\xff\xff\xfd\xfd\x00\x00\x00z', 0xfff7ffffffffffdb}) 12:47:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xc, 0x1}, [@ldst={0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xffffffffffffffba) 12:47:04 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 311.006841][T13584] IPVS: ftp: loaded support on port[0] = 21 12:47:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0xe3c, 0x0, 0x0, 0xfffffffffffffe5b) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000840)=ANY=[@ANYBLOB="780000000000000000e2e4245e86cf2ea0ece7e3450abe5bdc3f13cdd20cdd18847de8571c45499bfa72f5a31e8ce0e169ed16ab596baa50ae93257d1871d0f0b8723b45ed76304e06387009bed8831252310462a0c4235826adb98b1e0d954071029a5aa46bd9ac4895001c0000000000"], 0x1}], 0x1}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x1004cc], 0x12000}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000340)=""/123, &(0x7f0000000000)=0x7b) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 311.064951][T13606] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.072396][T13606] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.080354][T13606] device bridge0 left promiscuous mode 12:47:05 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) [ 311.212707][ T1381] tipc: TX() has been purged, node left! [ 311.296080][T13612] kvm [13611]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000006d data 0x4d00000000f [ 311.313149][T13612] kvm [13611]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000003b data 0x4d00000000f [ 311.337196][T13612] kvm [13611]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000009 data 0x4d00000000f [ 311.350922][T13607] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.358900][T13607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.369520][T13607] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.377432][T13607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.389073][T13607] device bridge0 entered promiscuous mode 12:47:05 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) [ 311.435777][T13609] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. [ 311.436733][T13612] kvm [13611]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000041 data 0x4d00000000f [ 311.462820][T13612] kvm [13611]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000000f data 0x4d00000000f [ 311.534104][T13612] kvm [13611]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000079 data 0x4d00000000f [ 311.593448][T13612] kvm [13611]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000047 data 0x4d00000000f [ 311.632575][T13612] kvm [13611]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000015 data 0x4d00000000f [ 311.679925][T13612] kvm [13611]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000007f data 0x4d00000000f [ 311.719485][T13612] kvm [13611]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000004d data 0x4d00000000f 12:47:06 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_int(r12, 0x1, 0x17, &(0x7f0000000000)=0xff, 0x4) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) setgroups(0x31dbe637, &(0x7f00000002c0)) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x60020000) fchmod(r4, 0x30) r13 = socket$alg(0x26, 0x5, 0x0) ioctl$FITRIM(r13, 0xc0185879, &(0x7f0000000100)={0x5, 0x101, 0x4}) 12:47:06 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:06 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000004f357c10b54fe720992bf6ff00b05f1a"], 0x14}}, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x84933c2a8a3a1f36, &(0x7f00000000c0), &(0x7f0000000400)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x3aec}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000340)='./bus\x00', 0x200002, 0x10) mknodat(r0, &(0x7f0000000580)='./file0/bus\x00', 0x100, 0xf519) r1 = getpgid(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x9, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) getitimer(0x0, &(0x7f0000000000)) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r4, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x64}, 0x1, 0x0, 0x0, 0x20008000}, 0x8040) sendfile(r2, r3, 0x0, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r3, 0x8004500b, &(0x7f0000000080)=0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x500, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x24, 0x9, 0x8, 0x0, 0x0, 0x3, 0x45802, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x5, @perf_config_ext, 0x8, 0x8, 0x4, 0x0, 0x0, 0x2, 0x5}, r1, 0x9, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) unshare(0x40000000) 12:47:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0xe3c, 0x0, 0x0, 0xfffffffffffffe5b) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000840)=ANY=[@ANYBLOB="780000000000000000e2e4245e86cf2ea0ece7e3450abe5bdc3f13cdd20cdd18847de8571c45499bfa72f5a31e8ce0e169ed16ab596baa50ae93257d1871d0f0b8723b45ed76304e06387009bed8831252310462a0c4235826adb98b1e0d954071029a5aa46bd9ac4895001c0000000000"], 0x1}], 0x1}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x1004cc], 0x12000}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000340)=""/123, &(0x7f0000000000)=0x7b) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 312.559798][T13633] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. [ 312.659590][T13634] IPVS: ftp: loaded support on port[0] = 21 12:47:06 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:07 executing program 5: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000001d00000000000000080676657468305f746f5f627269646765006e7230000000000000000000000000006772653000000000000010000000000076657468315f746f5f626f6e64000000aaaaaaaaaaaa000000000000aaaaaaaaaaaa00000000000000007000000070000000a80000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000feffffff0000000009000000000000000000697064647030000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000067726530000000000000000000000000ffffffffffff0000000000000000000000000000000000000000e000000018010000500100007261746565737400000000000000000000000000000000000000000000000000480000000000818e51513cf1e4040000000000000000000073797a5f74756e0000000000ff0f000000000000000000000004000000000000200000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000feffffff01000000110000000000000000006272696467655f736c6176655f310000000000000000000000000000000000006c6f00000000000000000000000000000080616d300000000000000000000000aaaaaaaaaa00000000000000aaaaaaaaaaaa0000000000000000a00000000801000040010000636f6e6e6c6162656c000000000000000000000000000000000000000000000008000000000000000000000000000000434c41535349465b00000000000000000000000000000000000000000000000008000000000000000000000000000000736e617400000051000000000000000000000000000000100000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb00"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_int(r12, 0x1, 0x17, &(0x7f0000000000)=0xff, 0x4) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) setgroups(0x31dbe637, &(0x7f00000002c0)) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x60020000) fchmod(r4, 0x30) r13 = socket$alg(0x26, 0x5, 0x0) ioctl$FITRIM(r13, 0xc0185879, &(0x7f0000000100)={0x5, 0x101, 0x4}) 12:47:07 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 313.070727][T13638] IPVS: ftp: loaded support on port[0] = 21 12:47:07 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0xe3c, 0x0, 0x0, 0xfffffffffffffe5b) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000840)=ANY=[@ANYBLOB="780000000000000000e2e4245e86cf2ea0ece7e3450abe5bdc3f13cdd20cdd18847de8571c45499bfa72f5a31e8ce0e169ed16ab596baa50ae93257d1871d0f0b8723b45ed76304e06387009bed8831252310462a0c4235826adb98b1e0d954071029a5aa46bd9ac4895001c0000000000"], 0x1}], 0x1}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x1004cc], 0x12000}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000340)=""/123, &(0x7f0000000000)=0x7b) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 12:47:07 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) [ 313.464690][T13657] IPVS: ftp: loaded support on port[0] = 21 [ 313.493896][T13653] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. 12:47:07 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:07 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_int(r12, 0x1, 0x17, &(0x7f0000000000)=0xff, 0x4) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) setgroups(0x31dbe637, &(0x7f00000002c0)) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x60020000) fchmod(r4, 0x30) r13 = socket$alg(0x26, 0x5, 0x0) ioctl$FITRIM(r13, 0xc0185879, &(0x7f0000000100)={0x5, 0x101, 0x4}) 12:47:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0xe3c, 0x0, 0x0, 0xfffffffffffffe5b) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000840)=ANY=[@ANYBLOB="780000000000000000e2e4245e86cf2ea0ece7e3450abe5bdc3f13cdd20cdd18847de8571c45499bfa72f5a31e8ce0e169ed16ab596baa50ae93257d1871d0f0b8723b45ed76304e06387009bed8831252310462a0c4235826adb98b1e0d954071029a5aa46bd9ac4895001c0000000000"], 0x1}], 0x1}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x1004cc], 0x12000}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000340)=""/123, &(0x7f0000000000)=0x7b) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 313.852842][ T1381] tipc: TX() has been purged, node left! [ 313.895614][T13670] IPVS: ftp: loaded support on port[0] = 21 [ 314.046377][T13677] IPVS: ftp: loaded support on port[0] = 21 [ 314.603090][T13670] chnl_net:caif_netlink_parms(): no params data found [ 314.655662][T13670] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.662919][T13670] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.671210][T13670] device bridge_slave_0 entered promiscuous mode [ 314.681226][T13670] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.688477][T13670] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.697402][T13670] device bridge_slave_1 entered promiscuous mode [ 314.728989][T13670] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 314.741036][T13670] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 314.768327][T13670] team0: Port device team_slave_0 added [ 314.780793][T13670] team0: Port device team_slave_1 added 12:47:08 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:08 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:08 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "000001", 0x30, 0x3a, 0x0, @remote, @mcast2={0xff, 0x4, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3801, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @loopback}}}}}}}, 0x0) 12:47:08 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r0, 0x0) mremap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) [ 314.835695][T13670] device hsr_slave_0 entered promiscuous mode [ 314.902485][T13670] device hsr_slave_1 entered promiscuous mode [ 314.951864][T13670] debugfs: Directory 'hsr0' with parent '/' already present! [ 315.115605][T13670] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 315.201736][T13670] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 315.277548][T13670] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 315.366254][T13670] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 315.485050][T13670] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.492276][T13670] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.499748][T13670] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.506962][T13670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.584919][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.593265][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.608954][T13670] 8021q: adding VLAN 0 to HW filter on device bond0 [ 315.624500][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 315.632632][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 315.645416][T13670] 8021q: adding VLAN 0 to HW filter on device team0 [ 315.665072][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 315.674655][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 315.683657][T13575] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.690755][T13575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.699127][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 315.708146][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 315.717086][T13575] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.724205][T13575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.732592][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 315.750340][T12661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 315.777069][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 315.787817][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 315.797447][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 315.806607][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 315.815916][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 315.824639][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 315.835903][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 315.848917][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 315.858494][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 315.870789][T13670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 315.894393][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 315.902977][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 315.918454][T13670] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 316.057074][T13697] IPVS: ftp: loaded support on port[0] = 21 12:47:10 executing program 5: r0 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x30000, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f20f31d200050024584f315f111200070000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) 12:47:10 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_int(r12, 0x1, 0x17, &(0x7f0000000000)=0xff, 0x4) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) setgroups(0x31dbe637, &(0x7f00000002c0)) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x60020000) fchmod(r4, 0x30) r13 = socket$alg(0x26, 0x5, 0x0) ioctl$FITRIM(r13, 0xc0185879, &(0x7f0000000100)={0x5, 0x101, 0x4}) 12:47:10 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:10 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f0000000140)={0x0, 0x0, 0x0, [], &(0x7f0000000100)=0x1f}) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000100)) 12:47:10 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 12:47:10 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 316.242044][ T1381] tipc: TX() has been purged, node left! [ 316.373003][ T1381] tipc: TX() has been purged, node left! 12:47:10 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) [ 316.449885][T13715] IPVS: ftp: loaded support on port[0] = 21 12:47:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1, 0x40}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000500)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @local}, r1}}, 0x48) 12:47:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) flock(r3, 0x0) 12:47:11 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x10, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:11 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000140)={0x2}) 12:47:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e000000130081c5e4050cecdb4cb9040a485e431a00000000fffffff08ef9000600b0ebb06ac40006000100f9ff", 0x2e}], 0x1}, 0x0) 12:47:11 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000140)={0x2}) 12:47:12 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_int(r12, 0x1, 0x17, &(0x7f0000000000)=0xff, 0x4) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) setgroups(0x31dbe637, &(0x7f00000002c0)) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x60020000) fchmod(r4, 0x30) socket$alg(0x26, 0x5, 0x0) 12:47:12 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x10, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:12 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 12:47:12 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000140)={0x2}) 12:47:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000180)="d38100ffe6002b452b7b4f0a7ff32588e4b3a5e608000000", 0x18, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000400)={r1, r2, r1}, &(0x7f0000000500)=""/83, 0xfffffef6, 0x0) 12:47:12 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:12 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000140)={0x2}) [ 318.548404][T13763] IPVS: ftp: loaded support on port[0] = 21 12:47:12 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x10, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:12 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') open(0x0, 0x8000, 0x0) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r1, r1, &(0x7f0000000240), 0x2008000fffffffe) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 318.635212][ T1381] tipc: TX() has been purged, node left! 12:47:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) socket$inet6(0xa, 0x3, 0x87) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/186, 0xba}], 0x1, 0x2) 12:47:13 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:13 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_int(r12, 0x1, 0x17, &(0x7f0000000000)=0xff, 0x4) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) setgroups(0x31dbe637, &(0x7f00000002c0)) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x60020000) fchmod(r4, 0x30) 12:47:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x0) 12:47:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x353, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000001000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105511, &(0x7f0000001000)) [ 319.392513][T13786] IPVS: ftp: loaded support on port[0] = 21 12:47:13 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 12:47:13 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:13 executing program 1: r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x402c5342, &(0x7f0000000440)={0x0, 0x7a120, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a01]}) 12:47:14 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:14 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) userfaultfd(0x0) 12:47:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="4c0000001100fff1fefefd956fa283b724a6008000000000000000683540150024001c000d000000b598bc593ab682115ed9443d51d7e88dc62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=""/35, 0x23}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x299, &(0x7f0000000100)}], 0x492492492492805, 0x0) 12:47:14 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:14 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000001d00000000000000080676657468305f746f5f627269646765006e7230000000000000000000000000006772653000000000000010000000000076657468315f746f5f626f6e64000000aaaaaaaaaaaa000000000000aaaaaaaaaaaa00000000000000007000000070000000a80000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000feffffff0000000009000000000000000000697064647030000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000067726530000000000000000000000000ffffffffffff0000000000000000000000000000000000000000e000000018010000500100007261746565737400000000000000000000000000000000000000000000000000480000000000818e51513cf1e4040000000000000000000073797a5f74756e0000000000ff0f000000000000000000000004000000000000200000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000feffffff01000000110000000000000000006272696467655f736c6176655f310000000000000000000000000000000000006c6f00000000000000000000000000000080616d300000000000000000000000aaaaaaaaaa00000000000000aaaaaaaaaaaa0000000000000000a00000000801000040010000636f6e6e6c6162656c000000000000000000000000000000000000000000000008000000000000000000000000000000434c41535349465b00000000000000000000000000000000000000000000000008000000000000000000000000000000736e617400000051000000000000000000000000000000100000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb00"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_int(r12, 0x1, 0x17, &(0x7f0000000000)=0xff, 0x4) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) setgroups(0x31dbe637, &(0x7f00000002c0)) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x60020000) [ 320.265918][T13814] netlink: 'syz-executor.1': attribute type 28 has an invalid length. [ 320.274257][T13814] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:47:14 executing program 5: r0 = socket$inet6(0xa, 0x2000000080803, 0x2f) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@multicast1, 0x0, 0x0, 0x0, 0x6}}, 0xe8) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x80) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000240)=0x5, 0x4) getrusage(0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 12:47:14 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x0, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) [ 320.516138][T13821] IPVS: ftp: loaded support on port[0] = 21 12:47:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="4c0000001100fff1fefefd956fa283b724a6008000000000000000683540150024001c000d000000b598bc593ab682115ed9443d51d7e88dc62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=""/35, 0x23}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x299, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 320.867605][T13833] netlink: 'syz-executor.1': attribute type 28 has an invalid length. [ 320.876282][T13833] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:47:14 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x0, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:15 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 12:47:15 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80044df9, &(0x7f0000000000)) 12:47:15 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x0, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:15 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:15 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_int(r12, 0x1, 0x17, &(0x7f0000000000)=0xff, 0x4) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) setgroups(0x31dbe637, &(0x7f00000002c0)) syz_open_dev$mice(0x0, 0x0, 0x0) unshare(0x60020000) 12:47:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="4c0000001100fff1fefefd956fa283b724a6008000000000000000683540150024001c000d000000b598bc593ab682115ed9443d51d7e88dc62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=""/35, 0x23}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x299, &(0x7f0000000100)}], 0x492492492492805, 0x0) 12:47:15 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80044df9, &(0x7f0000000000)) 12:47:15 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x0, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) [ 321.809279][T13867] netlink: 'syz-executor.1': attribute type 28 has an invalid length. [ 321.817819][T13867] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:47:15 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x0, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) [ 321.877503][T13869] IPVS: ftp: loaded support on port[0] = 21 12:47:16 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80044df9, &(0x7f0000000000)) 12:47:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="4c0000001100fff1fefefd956fa283b724a6008000000000000000683540150024001c000d000000b598bc593ab682115ed9443d51d7e88dc62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=""/35, 0x23}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x299, &(0x7f0000000100)}], 0x492492492492805, 0x0) 12:47:16 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x0, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) [ 322.111759][ T1381] tipc: TX() has been purged, node left! 12:47:16 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80044df9, &(0x7f0000000000)) 12:47:16 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000483000/0x3000)=nil, 0x3000, 0x8003, &(0x7f0000000000)=0x20003, 0x8, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x402, 0x0) [ 322.248354][T13881] netlink: 'syz-executor.1': attribute type 28 has an invalid length. [ 322.251709][ T1381] tipc: TX() has been purged, node left! [ 322.256770][T13881] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:47:16 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000001d00000000000000080676657468305f746f5f627269646765006e7230000000000000000000000000006772653000000000000010000000000076657468315f746f5f626f6e64000000aaaaaaaaaaaa000000000000aaaaaaaaaaaa00000000000000007000000070000000a80000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000feffffff0000000009000000000000000000697064647030000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000067726530000000000000000000000000ffffffffffff0000000000000000000000000000000000000000e000000018010000500100007261746565737400000000000000000000000000000000000000000000000000480000000000818e51513cf1e4040000000000000000000073797a5f74756e0000000000ff0f000000000000000000000004000000000000200000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000feffffff01000000110000000000000000006272696467655f736c6176655f310000000000000000000000000000000000006c6f00000000000000000000000000000080616d300000000000000000000000aaaaaaaaaa00000000000000aaaaaaaaaaaa0000000000000000a00000000801000040010000636f6e6e6c6162656c000000000000000000000000000000000000000000000008000000000000000000000000000000434c41535349465b00000000000000000000000000000000000000000000000008000000000000000000000000000000736e617400000051000000000000000000000000000000100000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb00"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_int(r12, 0x1, 0x17, &(0x7f0000000000)=0xff, 0x4) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) setgroups(0x31dbe637, &(0x7f00000002c0)) unshare(0x60020000) [ 322.378860][T13889] mmap: syz-executor.2 (13889) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 322.432107][ T1381] tipc: TX() has been purged, node left! [ 322.484106][T13894] IPVS: ftp: loaded support on port[0] = 21 12:47:17 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:17 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) socket(0x15, 0x80005, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:17 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7ff}, 0x10) write(r0, &(0x7f0000000080)="200000001a00010000000066835f7f081c000000000000000000000004000500", 0x20) 12:47:17 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x4c, 0x0, &(0x7f00000004c0)=[@reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000540)="87"}) 12:47:17 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_int(r12, 0x1, 0x17, &(0x7f0000000000)=0xff, 0x4) getgroups(0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]) unshare(0x60020000) 12:47:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b5", 0x8d}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0, 0x0, 0x0, 0xfffffffffffffe8c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1f) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 12:47:17 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x1) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$P9_RSTATu(r2, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000000c0)={0x80, 0x1f4}) [ 323.140939][T13918] IPVS: ftp: loaded support on port[0] = 21 12:47:17 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) socket(0x15, 0x80005, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:17 executing program 1: io_setup(0x104, &(0x7f0000002b40)=0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000002a40)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x26f9, r2, 0x0, 0x0, 0x0, 0x0, 0x2}]) 12:47:17 executing program 5: setrlimit(0x2, &(0x7f0000e63ff0)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000bfe000/0x400000)=nil, &(0x7f0000d81000/0x2000)=nil, &(0x7f0000f3a000/0x1000)=nil, &(0x7f0000c7a000/0x3000)=nil, &(0x7f0000ecf000/0x4000)=nil, 0x0}, 0x68) 12:47:17 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) socket(0x15, 0x80005, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:17 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0x0, &(0x7f0000000180)) 12:47:18 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x500204) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000000100)='.\x00', &(0x7f0000000540)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x20000, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0, 0x5010, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x7, 0x0) link(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000100)='./file0/file0\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000005, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendfile(r2, r3, 0x0, 0x8000dffffffe) 12:47:18 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_int(r12, 0x1, 0x17, &(0x7f0000000000)=0xff, 0x4) unshare(0x60020000) 12:47:18 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:47:18 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x0, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) [ 324.073336][T13961] IPVS: ftp: loaded support on port[0] = 21 12:47:18 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000540)={0xffffffffffffffff, &(0x7f0000000380)="88e28536539e76a3bc42a145cf700dc5cbff66a238cedaaa75d3273d0275333ce2a7aaff90a28da2156f12ac50fadfa60d", 0x0}, 0x20) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x8, &(0x7f00000004c0)=0x0) io_submit(r1, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 12:47:18 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x0, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x1c, 0x18, 0x21}, 0x1c}}, 0x0) 12:47:18 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x0, 0x2719, 0x0, &(0x7f000033bffc)) 12:47:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200003d9) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 12:47:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="ff02040000eeff0000000000000000000000000000020205", 0x18) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, 0x1c) 12:47:19 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:19 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") unshare(0x60020000) 12:47:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0xa8, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x80, 0x2b, [@IFLA_XDP_FD={0x7c, 0x1, {0x81000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_GROUP={0x8}]}, 0xa8}}, 0x0) 12:47:19 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 12:47:19 executing program 5: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x22fffffe) 12:47:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200003d9) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 325.402217][T13998] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 325.411426][T13998] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 325.420755][T13998] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 325.429949][T13998] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 325.439126][T13998] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 325.448291][T13998] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 325.457462][T13998] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 325.467147][T13998] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 325.476794][T13998] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 325.486022][T13998] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 12:47:19 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x0, 0x0, &(0x7f000033bffc)) [ 325.497359][T13998] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 325.510179][T13998] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 325.518076][T13998] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 325.552087][T14002] IPVS: ftp: loaded support on port[0] = 21 12:47:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000bfdfdc)={0x20, 0x3, 0x1, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) [ 325.803423][T14009] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 325.813066][T14009] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 12:47:19 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 12:47:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xe0000200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:47:20 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x60020000) 12:47:20 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, 0x0) [ 326.042123][T14017] IPVS: ftp: loaded support on port[0] = 21 [ 326.065986][ T1381] tipc: TX() has been purged, node left! [ 326.214557][T14026] IPVS: ftp: loaded support on port[0] = 21 12:47:20 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:20 executing program 1: io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000000)="5904329fedb004f617afa5c5164a3f435a37", 0xfdcd}]) 12:47:20 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, 0x0) 12:47:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200003d9) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 326.322103][ T1381] tipc: TX() has been purged, node left! [ 326.357696][T14030] IPVS: ftp: loaded support on port[0] = 21 12:47:20 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2719, 0x0, 0x0) 12:47:20 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) readv(r11, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/84, 0x54}, {0xfffffffffffffffd}, {&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/67, 0x43}, {&(0x7f0000000640)=""/88, 0x58}], 0x5) unshare(0x60020000) [ 326.651323][T14034] skbuff: bad partial csum: csum=62980/44823 headroom=64 headlen=3712 [ 326.702452][ T1381] tipc: TX() has been purged, node left! [ 326.709922][ T1381] tipc: TX() has been purged, node left! 12:47:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000010000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:47:20 executing program 4: r0 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f00003b6ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x400, 0x2) [ 326.810511][T14034] skbuff: bad partial csum: csum=62980/44823 headroom=64 headlen=3712 12:47:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200003d9) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 326.921360][T14053] IPVS: ftp: loaded support on port[0] = 21 12:47:21 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000240)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505331, &(0x7f0000000140)={{}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 12:47:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$netlink(0xa, 0x6, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10d, 0xd, &(0x7f0000001ffc)=0x2, 0x1) listen(r1, 0x0) 12:47:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f00000000c0)={0x7a, 0x0, [0x572], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 12:47:21 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:21 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) 12:47:21 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) r11 = socket(0x10, 0x802, 0x0) getpeername$packet(r11, 0x0, &(0x7f00000000c0)) unshare(0x60020000) 12:47:21 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) unshare(0x600) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0104307, 0x0) lsetxattr$system_posix_acl(&(0x7f0000002640)='./file0\x00', 0x0, 0x0, 0x0, 0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40045108, &(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f00000002c0)) 12:47:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000180)=@newlink={0x8c, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x60, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x50, 0x2, [@gre_common_policy=[@IFLA_GRE_ERSPAN_DIR={0x8}, @IFLA_GRE_ENCAP_FLAGS={0x8}, @IFLA_GRE_ERSPAN_HWID={0x8}, @IFLA_GRE_FWMARK={0x8}, @IFLA_GRE_ERSPAN_HWID={0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_ERSPAN_INDEX={0x8}, @IFLA_GRE_IKEY={0x8}, @IFLA_GRE_IKEY={0x8}, @IFLA_GRE_ERSPAN_INDEX={0x8}]]}}}, @IFLA_BROADCAST={0xc, 0x3, @local}]}, 0x8c}}, 0x0) 12:47:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000200000000000000000000000800040000000000", 0x24) [ 327.897343][T14088] IPVS: ftp: loaded support on port[0] = 21 12:47:22 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1aa1, 0x802) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004550d, 0x0) 12:47:22 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 12:47:22 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) write$vnet(r0, &(0x7f0000000140)={0x1, {0x0, 0xffffffffffffff95, 0x0}}, 0x3b) close(r0) 12:47:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f000095c000)="2400000026007f000000000000007701000000ff0100000001000000ffffffff0100ff10", 0x24) 12:47:22 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000001d00000000000000080676657468305f746f5f627269646765006e7230000000000000000000000000006772653000000000000010000000000076657468315f746f5f626f6e64000000aaaaaaaaaaaa000000000000aaaaaaaaaaaa00000000000000007000000070000000a80000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000feffffff0000000009000000000000000000697064647030000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000067726530000000000000000000000000ffffffffffff0000000000000000000000000000000000000000e000000018010000500100007261746565737400000000000000000000000000000000000000000000000000480000000000818e51513cf1e4040000000000000000000073797a5f74756e0000000000ff0f000000000000000000000004000000000000200000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000feffffff01000000110000000000000000006272696467655f736c6176655f310000000000000000000000000000000000006c6f00000000000000000000000000000080616d300000000000000000000000aaaaaaaaaa00000000000000aaaaaaaaaaaa0000000000000000a00000000801000040010000636f6e6e6c6162656c000000000000000000000000000000000000000000000008000000000000000000000000000000434c41535349465b00000000000000000000000000000000000000000000000008000000000000000000000000000000736e617400000051000000000000000000000000000000100000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb00"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) socket(0x10, 0x802, 0x0) unshare(0x60020000) 12:47:22 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) [ 328.637250][T14119] IPVS: ftp: loaded support on port[0] = 21 12:47:23 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:23 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) setxattr$smack_xattr_label(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 12:47:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xee) perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3b, 0x0, &(0x7f0000000000)) 12:47:23 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) ioctl$KDENABIO(r6, 0x4b36) unshare(0x60020000) 12:47:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x2, 0x6, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 12:47:23 executing program 2: sched_setattr(0x0, &(0x7f0000000080)={0xfffffffffffffda8, 0x0, 0x0, 0x0, 0x4000000000021}, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffb9, &(0x7f0000000080)) [ 329.170420][T14135] IPVS: ftp: loaded support on port[0] = 21 12:47:23 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) setxattr$smack_xattr_label(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 12:47:23 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x0, 0x104000000000032, 0xffffffffffffffff, 0x0) unshare(0x20400) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 12:47:23 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x40045109, 0xffffffffffffffff) 12:47:23 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r3, &(0x7f0000000780)=""/246, 0xf6) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r6) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r9 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r8, r9) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) fchown(r10, 0x0, r0) unshare(0x60020000) 12:47:23 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) 12:47:23 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) setxattr$smack_xattr_label(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 329.812849][T14162] IPVS: ftp: loaded support on port[0] = 21 12:47:24 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:24 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x5, 0x35}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 12:47:24 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000300)='/dev/video#\x00', 0x100000000, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0xa, 0x100, 0x2}) 12:47:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) setxattr$smack_xattr_label(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 12:47:24 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r5) r6 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r6, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r8 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r7, r8) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) unshare(0x60020000) 12:47:24 executing program 2: pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x0) close(r0) flock(r0, 0x0) 12:47:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20000084) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00d175040f62b04a2b546fc54c1960b89c40ebb373585806dbb7d553b4a400"/57, 0x39}], 0x1}, 0x0) [ 330.462481][T14183] IPVS: ftp: loaded support on port[0] = 21 12:47:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0x5a, 0xa01}, 0x14}}, 0x0) 12:47:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20000084) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00d175040f62b04a2b546fc54c1960b89c40ebb373585806dbb7d553b4a400"/57, 0x39}], 0x1}, 0x0) 12:47:25 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) [ 330.872415][ T1381] tipc: TX() has been purged, node left! 12:47:25 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r5) r6 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r6, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r8 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r7, r8) socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x60020000) 12:47:25 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000100)={0x0, 0x0, 0x8001}) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000100)) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4}) [ 331.031912][ T1381] tipc: TX() has been purged, node left! [ 331.098294][T14204] IPVS: ftp: loaded support on port[0] = 21 [ 331.193571][ T1381] tipc: TX() has been purged, node left! [ 331.374730][ T1381] tipc: TX() has been purged, node left! 12:47:25 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="1400000013007bff000000002578173f413c18b38cb169da1300cec7a6a1b4096616e3339a8b0fbfa93b70c26d857504f9b60307b59943e1b6b3d403c4341a991b97a16dffd1"], 0x14}, 0x1, 0x68}, 0x0) r2 = socket(0x10, 0x80002, 0x8000000010) sendmmsg$alg(r2, &(0x7f0000000080), 0x492492492492ad2, 0x0) 12:47:25 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000003300050ad25a80648c6356c10424fc004000000016000900053582c1b0acea8b090009", 0x27}], 0x1}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x24}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="c700000034002908000000000000000003000000c70000003b000100ffff0000000000000000b5068035fff2"], 0xfde8}, 0x1, 0xffffff7f0e000000}, 0x0) 12:47:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20000084) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00d175040f62b04a2b546fc54c1960b89c40ebb373585806dbb7d553b4a400"/57, 0x39}], 0x1}, 0x0) 12:47:25 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r5) r6 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r6, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) r8 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r7, r8) unshare(0x60020000) [ 331.532516][ T1381] tipc: TX() has been purged, node left! [ 331.607583][T14220] IPVS: ftp: loaded support on port[0] = 21 12:47:25 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x4001, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) keyctl$clear(0x7, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) ftruncate(r2, 0x80003) sendfile(r0, r2, 0x0, 0x8000fffffffe) 12:47:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20000084) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00d175040f62b04a2b546fc54c1960b89c40ebb373585806dbb7d553b4a400"/57, 0x39}], 0x1}, 0x0) [ 331.693622][ T1381] tipc: TX() has been purged, node left! [ 331.705469][ T1381] tipc: TX() has been purged, node left! 12:47:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="1400000013007bff000000002578173f413c18b38cb169da1300cec7a6a1b4096616e3339a8b0fbfa93b70c26d857504f9b60307b59943e1b6b3d403c4341a991b97a16dffd1"], 0x14}, 0x1, 0x68}, 0x0) r2 = socket(0x10, 0x80002, 0x8000000010) sendmmsg$alg(r2, &(0x7f0000000080), 0x492492492492ad2, 0x0) 12:47:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 12:47:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="1400000013007bff000000002578173f413c18b38cb169da1300cec7a6a1b4096616e3339a8b0fbfa93b70c26d857504f9b60307b59943e1b6b3d403c4341a991b97a16dffd1"], 0x14}, 0x1, 0x68}, 0x0) r2 = socket(0x10, 0x80002, 0x8000000010) sendmmsg$alg(r2, &(0x7f0000000080), 0x492492492492ad2, 0x0) 12:47:26 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)={0xfffffffb}) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0x9) 12:47:26 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r5) r6 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r6, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) getegid() unshare(0x60020000) [ 332.448045][T14252] IPVS: ftp: loaded support on port[0] = 21 12:47:26 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:26 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) bind$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2, 0x4}}, 0x24) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$rxrpc(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x71a000) 12:47:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 12:47:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1000000007, &(0x7f0000000640)=0x6, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000200), &(0x7f0000000180)=0x4) 12:47:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="1400000013007bff000000002578173f413c18b38cb169da1300cec7a6a1b4096616e3339a8b0fbfa93b70c26d857504f9b60307b59943e1b6b3d403c4341a991b97a16dffd1"], 0x14}, 0x1, 0x68}, 0x0) r2 = socket(0x10, 0x80002, 0x8000000010) sendmmsg$alg(r2, &(0x7f0000000080), 0x492492492492ad2, 0x0) 12:47:26 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r5) r6 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r6, &(0x7f0000000080)={0x14}, 0xffffffab) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@dev}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xffffffffffffff7d) unshare(0x60020000) [ 332.819459][T14267] IPVS: ftp: loaded support on port[0] = 21 12:47:27 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r0 = fsopen(&(0x7f0000000100)='sysfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x3, &(0x7f0000000140)='silent\x00', &(0x7f0000000080), 0xffffff9c) 12:47:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000001c0)) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) 12:47:27 executing program 5: io_setup(0x3, &(0x7f00000000c0)=0x0) r1 = memfd_create(&(0x7f0000000100)='\xfa\x13+\xfcritynA\x00ev:ppp1b\xe4ev\x00', 0x7) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x2}]) 12:47:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 12:47:27 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r5) r6 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r6, &(0x7f0000000080)={0x14}, 0xffffffab) unshare(0x60020000) 12:47:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self\x00', 0x0, 0x0) dup(r3) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$sock_SIOCETHTOOL(r8, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f00000001c0)=ANY=[@ANYRES16=r8]}) r9 = dup2(r4, r8) dup3(r9, r7, 0x0) [ 333.262443][T14287] IPVS: ftp: loaded support on port[0] = 21 12:47:27 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:27 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, {[@generic={0x0, 0x3, "81"}, @ssrr={0x89, 0xb, 0x0, [@loopback, @empty]}, @ra={0x94, 0x6}, @generic={0x0, 0x9, "6f32e57fb02c10"}, @ra={0x94, 0x6}, @ssrr={0x89, 0x17, 0x0, [@multicast1, @rand_addr, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback]}, @ssrr={0x89, 0x3}]}}}}}}}, 0x0) 12:47:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000100)) 12:47:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 12:47:27 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r5) open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) unshare(0x60020000) 12:47:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @erspan={{0xc, 0x1, 'erspan\x00'}, {0x10, 0x2, [@gre_common_policy=[@IFLA_GRE_ERSPAN_INDEX={0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x40}}, 0x0) [ 333.833289][T14310] IPVS: ftp: loaded support on port[0] = 21 12:47:28 executing program 2: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) 12:47:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/kcm\x00\b\x00') socket$kcm(0x29, 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 12:47:28 executing program 4: madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mremap(&(0x7f0000b37000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f00008f1000/0x3000)=nil) 12:47:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="040100002400070500"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x170}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 12:47:28 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000780)=""/4096, 0x1000}], 0x1) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045009, &(0x7f00000000c0)=0x8) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) 12:47:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000023c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) [ 334.505326][T14333] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. [ 334.546580][T14333] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. [ 334.591420][T14340] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. [ 334.616406][T14340] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. 12:47:28 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c0000000100000000390009003500400206000000190015", 0x2b}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:28 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r5) unshare(0x60020000) 12:47:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r2}, 0x8) 12:47:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000023c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) 12:47:28 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x8000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffa}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180), 0x2) 12:47:28 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000780)=""/4096, 0x1000}], 0x1) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045009, &(0x7f00000000c0)=0x8) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) [ 334.919160][T14354] IPVS: ftp: loaded support on port[0] = 21 [ 334.963363][T14361] sctp: [Deprecated]: syz-executor.4 (pid 14361) Use of struct sctp_assoc_value in delayed_ack socket option. [ 334.963363][T14361] Use struct sctp_sack_info instead 12:47:29 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000023c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) 12:47:29 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c0000000100000000390009003500400206000000190015", 0x2b}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r2}, 0x8) 12:47:29 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') unshare(0x60020000) 12:47:29 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000023c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) 12:47:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000780)=""/4096, 0x1000}], 0x1) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045009, &(0x7f00000000c0)=0x8) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) [ 335.406769][T14381] sctp: [Deprecated]: syz-executor.4 (pid 14381) Use of struct sctp_assoc_value in delayed_ack socket option. [ 335.406769][T14381] Use struct sctp_sack_info instead 12:47:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r2}, 0x8) 12:47:29 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x8000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffa}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180), 0x2) [ 335.536592][T14389] IPVS: ftp: loaded support on port[0] = 21 12:47:29 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c0000000100000000390009003500400206000000190015", 0x2b}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:29 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x8000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffa}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180), 0x2) 12:47:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000780)=""/4096, 0x1000}], 0x1) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045009, &(0x7f00000000c0)=0x8) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) [ 335.780250][T14399] sctp: [Deprecated]: syz-executor.4 (pid 14399) Use of struct sctp_assoc_value in delayed_ack socket option. [ 335.780250][T14399] Use struct sctp_sack_info instead 12:47:30 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r2}, 0x8) 12:47:30 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') unshare(0x60020000) 12:47:30 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75a", 0x40}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 336.082952][T14414] IPVS: ftp: loaded support on port[0] = 21 [ 336.107188][T14417] sctp: [Deprecated]: syz-executor.4 (pid 14417) Use of struct sctp_assoc_value in delayed_ack socket option. [ 336.107188][T14417] Use struct sctp_sack_info instead 12:47:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20", 0x79, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000740)='X', 0x1, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r4, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 12:47:30 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') unshare(0x60020000) 12:47:30 executing program 4: r0 = socket(0x10, 0x400000803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000022004701050007000200e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000077f000), 0x4) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff00ffe90009144aff0ae9", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000002400)={0x0, 0x0, 0x0}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 12:47:30 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75a", 0x40}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:30 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x81000000}, @random='5a3XI\f', [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x0, 0x8], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x1a6, 0x80ffffff, 0x28, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @ipv4={[0xfc], [], @multicast1}}}}}}}}, 0x0) [ 336.413281][T14427] IPVS: ftp: loaded support on port[0] = 21 12:47:30 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x8000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffa}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180), 0x2) 12:47:30 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x48001, 0x0) ioctl$EVIOCSREP(r0, 0x80045105, 0x0) 12:47:30 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x8000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffa}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180), 0x2) 12:47:30 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75a", 0x40}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:30 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) unshare(0x60020000) 12:47:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x8001, 0x0) sendfile(r1, r0, 0x0, 0x2800000000000) 12:47:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924fafe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4770e41f0fa8ae7891e20e1780931f3faf450b02b83048c1a9efa4a7c790000cbdd7bcd17db6d80a0b70ce886da58120c22630bfc84f1fec2e0a123bfd076a951cbfdc9fad0c80ec4d52c2ecf9c3b20", 0x14a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 336.982933][T14459] IPVS: ftp: loaded support on port[0] = 21 [ 337.003665][ T1381] tipc: TX() has been purged, node left! 12:47:31 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8", 0x4b}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xa, 0x0) 12:47:31 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) unshare(0x60020000) [ 337.202048][ T1381] tipc: TX() has been purged, node left! [ 337.275771][T14477] IPVS: ftp: loaded support on port[0] = 21 12:47:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fa, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x84201, 0x0) r2 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x6, 0x0, 0x0, 0x0) fsmount(r2, 0x0, 0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x525002, 0x0) r3 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r3, 0x6, 0x0, 0x0, 0x0) fsmount(r3, 0x0, 0x80) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x101, 0xc0800) r4 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) fsmount(r4, 0x0, 0x80) r5 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, [@IFLA_XDP_FLAGS={0x8}]}, @IFLA_BROADCAST={0xc}]}, 0x38}}, 0x0) 12:47:31 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8", 0x4b}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 337.374057][ T1381] tipc: TX() has been purged, node left! [ 337.423722][T14482] VFS: Mount too revealing [ 337.437719][T14482] VFS: Mount too revealing [ 337.454730][T14482] VFS: Mount too revealing [ 337.512589][ T1381] tipc: TX() has been purged, node left! 12:47:31 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x8000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffa}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180), 0x2) 12:47:31 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) keyctl$chown(0x4, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) unshare(0x60020000) 12:47:31 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000080)=0xfffffed4) 12:47:31 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8", 0x4b}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:31 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x8000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffffa}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180), 0x2) [ 337.681652][ T1381] tipc: TX() has been purged, node left! [ 337.814064][ T1381] tipc: TX() has been purged, node left! [ 337.837717][T14501] IPVS: ftp: loaded support on port[0] = 21 12:47:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x50, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'bond0\x00'}, @IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_MIIMON={0x8, 0x12}]}}}]}, 0x50}}, 0x0) [ 338.004466][ T1381] tipc: TX() has been purged, node left! [ 338.142120][ T1381] tipc: TX() has been purged, node left! [ 338.311731][ T1381] tipc: TX() has been purged, node left! [ 338.511705][ T1381] tipc: TX() has been purged, node left! 12:47:34 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000000040)=""/18, &(0x7f0000000000)=0x12) 12:47:34 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) renameat2(r3, &(0x7f00000002c0)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00', 0x3) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r5) unshare(0x60020000) 12:47:34 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060c", 0x50}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:34 executing program 4: r0 = socket(0x10, 0x800000000080003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"/429, @ANYRES32=0x0], 0x20}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 12:47:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x19, &(0x7f00006ed000), &(0x7f0000000000)=0x4) 12:47:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r2, &(0x7f0000000080)={0x138, 0x7d, 0x0, {{0x500, 0xd8, 0x0, 0x81ffffff, {0x5}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x13, 'ymimested%\x00'/20, 0xa, 'cgroup\x8dp1(', 0x68, '\xf8\xf6i\xfbq\xc2\xf3\xdf\x9f\x1b\n\x18\xf49\x85@\x9a\xc6[\x94\b\x039\xc0\x8c,;\x9c\x1dR\xc3l\xde{\x84\xa4 \xb4\xb0\xb4\xf14\xa6f\xa8RH\xf2\xb2\xb4\xa8\x8e\x01z\x88K\xaf\xe2\x81\xff\x1eg\xa8\xe2_G\xec!\xca\xbf\xf2\x0f\x9c\x1c\r\xbe6\xf4\xfd\xa2\x7f\x1f\xad\xff\xaa\xd5\xbbd\x9a7Z\xbd\xab\x14\xa7O\x98\x98\x04\xf4\x9e~\r\x8d'}, 0x4b, '/dev/nb{#\x00K\xb3\xb2\x1b\xb4$\xf3g\xcb\x06\x80{\xd7\xf9\xe3A\x04\xda\xd9\xfd\b\xb9\xa5=\xd0\'\x1b\xdc\xd9\xceH\x1dk\xdeR\xf7&\x969\xdc\xedu\xec\\\x87\xdc\rs\xeb\xd5\x80p\x8e\xa7/\xed\xe3\xf0\xc7\x18\xf9-?\xdfu'}}, 0x66) [ 340.200947][T14529] IPVS: ftp: loaded support on port[0] = 21 12:47:34 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)=0xfffffffe) 12:47:34 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 12:47:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f00000001c0)={0x20, 0x1, 0x2, 0x40000800000001, 0x0, 0x0, {0xa}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 12:47:34 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x38, 0x10, 0x43b, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r7}]]}}}]}, 0x38}}, 0x0) 12:47:34 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060c", 0x50}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:34 executing program 4: unshare(0x400) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, 0x0) 12:47:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r2, &(0x7f0000000880)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@flowinfo={{0x14, 0x29, 0xb, 0x1}}, @dstopts={{0x18}}], 0x30}}], 0x1, 0x0) [ 340.569910][T14547] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 340.581852][T14547] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 12:47:34 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20001, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r3) unshare(0x60020000) 12:47:34 executing program 5: socket$kcm(0x11, 0xa, 0x300) unshare(0x2000400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20002404}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r4, 0x100, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x8000) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) 12:47:34 executing program 1: mbind(&(0x7f0000024000/0xc00000)=nil, 0xc00000, 0x8001, &(0x7f0000c28000)=0x800003f, 0xf1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) [ 340.863998][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 340.871123][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:47:35 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060c", 0x50}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:47:35 executing program 4: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000280)=""/216, 0xfffffecd}], 0x1) [ 340.928168][T14567] IPVS: ftp: loaded support on port[0] = 21 12:47:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r2, &(0x7f0000000880)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@flowinfo={{0x14, 0x29, 0xb, 0x1}}, @dstopts={{0x18}}], 0x30}}], 0x1, 0x0) 12:47:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='\xfa\xe9\x00') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 341.108960][ T1381] tipc: TX() has been purged, node left! 12:47:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'ip6gretap0\x00', &(0x7f0000002fc0)=@ethtool_cmd={0xe}}) 12:47:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r2, &(0x7f0000000880)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@flowinfo={{0x14, 0x29, 0xb, 0x1}}, @dstopts={{0x18}}], 0x30}}], 0x1, 0x0) 12:47:35 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7ff, 0x200) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r3) unshare(0x60020000) [ 341.272437][ T1381] tipc: TX() has been purged, node left! 12:47:35 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206036c00000001000000003900090035004002060000001900154006000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab", 0x53}], 0x1}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 341.405572][T14593] IPVS: ftp: loaded support on port[0] = 21 [ 341.431220][T14583] kvm: emulating exchange as write [ 341.432842][ T1381] tipc: TX() has been purged, node left! 12:47:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r2, &(0x7f0000000880)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@flowinfo={{0x14, 0x29, 0xb, 0x1}}, @dstopts={{0x18}}], 0x30}}], 0x1, 0x0) 12:47:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) [ 341.645258][ T1381] tipc: TX() has been purged, node left! 12:47:35 executing program 0: stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') readlinkat(r0, &(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)=""/6, 0xfffffffffffffeac) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) read$char_usb(r2, &(0x7f0000000780)=""/246, 0xf6) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') fchdir(r3) unshare(0x60020000) 12:47:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0xd, 0x202) ioctl$USBDEVFS_RELEASE_PORT(r0, 0xc0105512, 0x0) 12:47:35 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') dup3(r0, r3, 0x0) [ 341.821651][ T1381] tipc: TX() has been purged, node left! [ 341.960723][T14614] IPVS: ftp: loaded support on port[0] = 21 [ 341.994815][T14147] ===================================================== [ 342.003091][T14147] BUG: KMSAN: uninit-value in __list_del_entry_valid+0x194/0x410 [ 342.012072][T14147] CPU: 1 PID: 14147 Comm: kworker/1:7 Not tainted 5.5.0-rc1-syzkaller #0 [ 342.021732][T14147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.032778][T14147] Workqueue: usb_hub_wq hub_event [ 342.038038][T14147] Call Trace: [ 342.041612][T14147] dump_stack+0x1c9/0x220 [ 342.046737][T14147] kmsan_report+0x128/0x220 [ 342.051491][T14147] __msan_warning+0x57/0xa0 [ 342.056406][T14147] __list_del_entry_valid+0x194/0x410 [ 342.062064][T14147] kcov_remote_start+0x13e/0x2e0 [ 342.067450][T14147] hub_event+0x190/0x76a0 [ 342.071880][T14147] ? kmsan_get_shadow_origin_ptr+0x91/0x4d0 [ 342.078721][T14147] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 342.085916][T14147] ? kmsan_get_shadow_origin_ptr+0x91/0x4d0 [ 342.093502][T14147] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 342.101096][T14147] ? kmsan_internal_set_origin+0x6a/0xb0 [ 342.107217][T14147] ? kmsan_get_shadow_origin_ptr+0x91/0x4d0 [ 342.113134][T14147] ? kmsan_get_shadow_origin_ptr+0x91/0x4d0 [ 342.119351][T14147] ? led_work+0x720/0x720 [ 342.123988][T14147] ? led_work+0x720/0x720 [ 342.129042][T14147] process_one_work+0x1572/0x1ef0 [ 342.139076][T14147] worker_thread+0x111b/0x2460 [ 342.147935][T14147] kthread+0x4b5/0x4f0 [ 342.154809][T14147] ? process_one_work+0x1ef0/0x1ef0 [ 342.167008][T14147] ? kthread_blkcg+0xf0/0xf0 [ 342.174746][T14147] ret_from_fork+0x35/0x40 [ 342.180804][T14147] [ 342.188953][T14147] Uninit was created at: [ 342.201037][T14147] kmsan_save_stack_with_flags+0x3c/0x90 [ 342.207894][T14147] kmsan_alloc_page+0x133/0x320 [ 342.215132][T14147] __alloc_pages_nodemask+0x1421/0x5fd0 [ 342.225048][T14147] alloc_pages_current+0x68d/0x9a0 [ 342.230694][T14147] __vmalloc_node_range+0x8c9/0x1270 [ 342.236310][T14147] vmalloc+0x106/0x120 [ 342.240650][T14147] kcov_remote_start+0x18e/0x2e0 [ 342.245839][T14147] hub_event+0x190/0x76a0 [ 342.250626][T14147] process_one_work+0x1572/0x1ef0 [ 342.256015][T14147] worker_thread+0x111b/0x2460 [ 342.262995][T14147] kthread+0x4b5/0x4f0 [ 342.268173][T14147] ret_from_fork+0x35/0x40 [ 342.272796][T14147] ===================================================== [ 342.280996][T14147] Disabling lock debugging due to kernel taint [ 342.287543][T14147] Kernel panic - not syncing: panic_on_warn set ... [ 342.294765][T14147] CPU: 1 PID: 14147 Comm: kworker/1:7 Tainted: G B 5.5.0-rc1-syzkaller #0 [ 342.305168][T14147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.315888][T14147] Workqueue: usb_hub_wq hub_event [ 342.321084][T14147] Call Trace: [ 342.324384][T14147] dump_stack+0x1c9/0x220 [ 342.331854][T14147] panic+0x3c9/0xc1e [ 342.335896][T14147] kmsan_report+0x215/0x220 [ 342.340683][T14147] __msan_warning+0x57/0xa0 [ 342.346409][T14147] __list_del_entry_valid+0x194/0x410 [ 342.352238][T14147] kcov_remote_start+0x13e/0x2e0 [ 342.357360][T14147] hub_event+0x190/0x76a0 [ 342.362052][T14147] ? kmsan_get_shadow_origin_ptr+0x91/0x4d0 [ 342.371264][T14147] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 342.378119][T14147] ? kmsan_get_shadow_origin_ptr+0x91/0x4d0 [ 342.384199][T14147] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 342.394589][T14147] ? kmsan_internal_set_origin+0x6a/0xb0 [ 342.401036][T14147] ? kmsan_get_shadow_origin_ptr+0x91/0x4d0 [ 342.407672][T14147] ? kmsan_get_shadow_origin_ptr+0x91/0x4d0 [ 342.416045][T14147] ? led_work+0x720/0x720 [ 342.421386][T14147] ? led_work+0x720/0x720 [ 342.425968][T14147] process_one_work+0x1572/0x1ef0 [ 342.431305][T14147] worker_thread+0x111b/0x2460 [ 342.436606][T14147] kthread+0x4b5/0x4f0 [ 342.440765][T14147] ? process_one_work+0x1ef0/0x1ef0 [ 342.446330][T14147] ? kthread_blkcg+0xf0/0xf0 [ 342.451449][T14147] ret_from_fork+0x35/0x40 [ 342.458106][T14147] Kernel Offset: 0x29800000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 342.474119][T14147] Rebooting in 86400 seconds..