e9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r0, 0x0, 0x0, 0x7) [ 492.673186][T14575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 492.724562][T14575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:19 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 492.823219][T14588] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 492.873028][T14588] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:19 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = epoll_create1(0x0) fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) r7 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r7, 0x0, 0x4000000000dc) [ 492.943096][T14588] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:19 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r0, 0x0, 0x0, 0x7) 20:42:19 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = epoll_create1(0x0) fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 493.268129][T14612] __report_access: 6 callbacks suppressed [ 493.268145][T14612] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[14612] 20:42:19 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 493.359153][T14621] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 493.392374][T14621] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000003c0), 0x0, 0x7) [ 493.456409][T14621] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 493.529322][T14630] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[14630] 20:42:19 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 493.619713][T14636] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:19 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = epoll_create1(0x0) fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) r6 = socket$inet6(0xa, 0x3, 0x6) r7 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r7, 0x0, 0x4000000000dc) [ 493.667071][T14636] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:20 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 493.743126][T14636] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000003c0), 0x0, 0x7) 20:42:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 493.989208][T14657] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[14657] 20:42:20 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:20 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:20 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 494.044128][T14657] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 494.068692][T14657] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 494.081044][T14657] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000003c0), 0x0, 0x7) 20:42:20 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 494.347200][T14678] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[14678] 20:42:20 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = epoll_create1(0x0) fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r6, 0x0, 0x4000000000dc) 20:42:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 494.441353][T14678] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 494.514505][T14678] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 494.554444][T14678] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000003c0)=[{0x0}], 0x1, 0x7) 20:42:20 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 494.588107][T14693] ptrace attach of "/root/syz-executor.3"[14692] was attempted by "/root/syz-executor.3"[14693] [ 494.717009][T14696] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[14696] [ 494.769559][T14699] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:21 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 494.871652][T14699] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 494.917081][T14709] ptrace attach of "/root/syz-executor.3"[14708] was attempted by "/root/syz-executor.3"[14709] [ 494.918147][T14699] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000003c0)=[{0x0}], 0x1, 0x7) 20:42:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:21 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 495.138583][T14719] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[14719] [ 495.203410][T14719] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:21 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = epoll_create1(0x0) fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r6, 0x0, 0x4000000000dc) 20:42:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000003c0)=[{0x0}], 0x1, 0x7) [ 495.257476][T14719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 495.287432][T14731] ptrace attach of "/root/syz-executor.3"[14730] was attempted by "/root/syz-executor.3"[14731] 20:42:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, 0xffffffffffffffff, 0x0) 20:42:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 495.332559][T14719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 495.593761][T14748] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[14748] [ 495.650946][T14748] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:21 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 495.694879][T14748] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 495.709127][T14748] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1, 0x0) 20:42:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:22 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = epoll_create1(0x0) fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r6, 0x0, 0x4000000000dc) 20:42:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1, 0x0) [ 495.921556][T14768] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 495.938607][T14768] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 495.946842][T14768] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:22 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 496.217773][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 496.284582][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 496.334884][T14781] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 496.403353][T14787] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 496.426737][T14787] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 496.434489][T14787] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, 0xffffffffffffffff, 0x0) 20:42:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1, 0x0) 20:42:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:24 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:24 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 498.496084][T14803] __report_access: 3 callbacks suppressed [ 498.496108][T14803] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[14803] [ 498.534927][T14806] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[14806] 20:42:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, 0xffffffffffffffff, 0x0) [ 498.577290][T14811] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:24 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4f20, 0x0) 20:42:24 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 498.628532][T14811] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 498.644081][T14811] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 498.728729][T14806] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:25 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 498.815320][T14806] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 498.861212][T14806] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:25 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:25 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 499.010165][T14836] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[14836] [ 499.051364][T14836] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 499.072929][T14836] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 499.102961][T14836] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:25 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:25 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 499.206678][T14846] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[14846] [ 499.262652][T14846] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 499.286611][T14846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 499.299760][T14846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:25 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 499.459512][T14858] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[14858] [ 499.540720][T14863] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 499.579959][T14863] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 499.619625][T14863] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:28 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:28 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='squashfs\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) 20:42:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:28 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:28 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 501.859080][ T2504] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 501.871953][T14884] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 501.880863][T14884] unable to read squashfs_super_block [ 501.887063][T14886] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[14886] [ 501.902913][ T2504] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 501.910276][T14883] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[14883] [ 501.921198][T14884] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 501.939913][T14884] unable to read squashfs_super_block 20:42:28 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 501.969588][T14891] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 502.021094][T14891] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 502.029251][T14891] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 502.064344][T14883] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 502.082614][T14883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 502.091150][T14883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getpid() setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000034000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = shmat(0x0, &(0x7f0000ff3000/0x3000)=nil, 0x4000) shmdt(r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="97bf5a5de8384e0ed1799224ccbedb8f000000000000001823f9f3540a7fba6007ab76a0de92f64daedb7d"], 0x34) shutdown(0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002600)=""/4102, 0x1006}], 0x1, 0x0, 0x0, 0x7115}, 0x100) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) mkdir(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000002c0)={0x0, @multicast2, @multicast2}, &(0x7f00000010c0)=0xc) bind$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x12, r5, 0x1, 0x2, 0x6, @broadcast}, 0x14) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$sock_netdev_private(0xffffffffffffffff, 0x89ef, &(0x7f0000000380)="c88b0d8dfbda8b1daa336e618d716ac94b750e196c42424766191f3c38161dede63ba6699f54c3b0c425c31df09e31e8cdbe6c9ee468561328418cf6a015d43d808c5e4748d0765cb63b282cf9e629d860ab8165d33a5368aec355161a0ef645dec3c5e7fa2e90cb7f99c3e110961f02d986281fb60394569fcb6dfbd3efbec599044ce3752f051ca9912ae505468284d0ee0882682ea30dc46ec6fd18119f6847d191afa5350436354ff88074058a035df09c62912beaa184301e43126993fbfb20c771b886e2d60878768e467c810e2df12faa3881a5e463e7697e22e17b163b74b47338fa1f42d38cc594e986e8a868a58cd86e8f81d19ae941404890bf9c2fee3ea075df72e2099f886e26c7e08f0ec22ebe7ad8fe4a8ad0a93976794fe16a87d19027a3c92722714b3dd7aeee4b58a7f6ce34010486bed638534f53c4262fa8fa136056d411ed784c44dcb645911e668cafa2e319da09d9544d6272a45b564f8204a93b276610c9058df681ef1a9838f0648b98334af98fe289cfa4a0075eaf442138c60efa76bb72d34675fbf460de01633813dcdeadd181f8504deba2e649f3212ab3877286fc45ee180bd133a626568353764adbf4bb3737f2205dbe02febb4c97563a2e2ddbe27e62c4eced24f74b2d30d15352e0da8350b409cc7e439bb1ca130049e4edc0db4d2e4c7629c2e605c0ac6e1868174ad9969e9dc50c8bd67780853c3a8429adace254d1a37975fc809b63f4aa639818dc0c8a0145225c5dd1129603f4559ca55e3b609751bf3a41698e12d483e1063fb523af53a9782c6b6ce1b2785427ffc20c66cf5224e354cb2d836168b008d7b6d9641589d40d1d2bf4888a2d01c40d773ae2becd3bf0d16468ef47eb838e7f2f053ea4146ed5553fa18fb94f49f86fbdadd227008d6ec6ca4d298a8ed9363c02b112e81ab27b81be254a34af6f9319d6fe7adf79264c4d68aec75c7e1b3535db1360fc0f50b0f66c0e51b2e442c974b89d47ce112236442b1d72502baddafa9bd6b56d218a86f271dbc15c35eefde30abf8896378d9d6c4c1e19f8b60d0d53b4bdf45fcdb4befb5395abf5b0a54db710cb4d9c28a022fc273808ac6fdebfb547f1bf4ce7cc9e9a3c6d392146cab2db0ea622890c1073138c070a943ce8583c0624811cdcad8d34efb5a2893116576dccd49eaa97fb121db843db70344aee11400355f68eef53d1926ca362d34abaa76025002cf618e2d04bea6e6088778c94b7b0b05b0eaea678a3f590921012a6ffcb6cddec925fc77c4c0dd691bdd507cea711fc26ec27bc17c0deae7f5ea0c7ae88468dc82eabd1e20e6ec72d4e89786c6e2361ec83d57c9bd06c570283e42bff3a690ae1eb29e9e9e6d099e9e62e3c5957416cec6f1981e6894d56395f2623956d6e1c2b6815eb64f3d414d438149bce650310d582d974e6606d48cd8028930a99a2d6ff31005be451d7e9223f8c9a09ef48be6ef9e7a321b874d05fe69e0b9a97c6538439d5f096e6699e0b7498ab8c5f5f5b2b568a540fc5561a0add21d618185452cd9306707439af6210a19a2ea14762733b70a486e89539c917abb8749cbe2357269a086450522ed0970d36e2d2836cb0027218753fa25e817255dd1431f2f21148adcde9e8e132086416f219e5b4ef1c30950b8c33e92dc04ee6e4d5cadb0ee04f4acf7b8845443f163067787e88ed5c169c3cc8fdd696f8f42f1296efa750e22e2874a7e104bfb3438612645b05790d1f50c17f288b768ae933de9ef9062a696c79dddf4c33b2d7e51295622547805736dde397aa893d09c343cc2e71cddfe289fbce26dc9527c9c7e9b65e6f1df99fe550e1f6c7f3a289cd64090052a63616d091302bcf3f2ac5fb0cc099a6704c33740ebfc76271a7c5d3f9727cb54ce7f693b9f3f6a02dde4fd117eb748ad60cb320815101c30ae5a412b5ef513e6d94ff9cdc92a0ae219de538f56a6dbb8e7d703ff239a2a0be8c4f1661bf12f079a5f6bc12e52b0147acf2bd5aad1a1a55730eedf63a02d89e84bb397b6d60e5ba539ab42ca7294477c49ef499d4f616cd30056f3e9ea10ef4e8a71260ea0ed9a38919532f7e0d14e745f7806bbba64da057acf0ddceec4bd69552c4562c112fc8e265a07e183ecb36610747bf3aad46") socket$inet6(0xa, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:42:28 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:28 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:28 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 502.370753][T14917] cgroup: fork rejected by pids controller in /syz3 20:42:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 502.438458][T14921] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[14921] [ 502.511241][T14921] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:28 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 502.563277][T14921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 502.584033][T14921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 502.628211][T15033] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[15033] [ 502.682499][T15033] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:29 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 502.774335][T15033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 502.795852][T15033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getpid() setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000034000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = shmat(0x0, &(0x7f0000ff3000/0x3000)=nil, 0x4000) shmdt(r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="97bf5a5de8384e0ed1799224ccbedb8f000000000000001823f9f3540a7fba6007ab76a0de92f64daedb7d"], 0x34) shutdown(0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002600)=""/4102, 0x1006}], 0x1, 0x0, 0x0, 0x7115}, 0x100) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) mkdir(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000002c0)={0x0, @multicast2, @multicast2}, &(0x7f00000010c0)=0xc) bind$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x12, r5, 0x1, 0x2, 0x6, @broadcast}, 0x14) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$sock_netdev_private(0xffffffffffffffff, 0x89ef, &(0x7f0000000380)="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") socket$inet6(0xa, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:42:29 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:29 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 503.149755][T15161] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[15161] 20:42:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 503.319270][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:29 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 503.406012][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 503.442768][T15173] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:29 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 503.594559][T15291] __report_access: 1 callbacks suppressed [ 503.594575][T15291] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[15291] 20:42:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getpid() setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000034000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = shmat(0x0, &(0x7f0000ff3000/0x3000)=nil, 0x4000) shmdt(r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="97bf5a5de8384e0ed1799224ccbedb8f000000000000001823f9f3540a7fba6007ab76a0de92f64daedb7d"], 0x34) shutdown(0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002600)=""/4102, 0x1006}], 0x1, 0x0, 0x0, 0x7115}, 0x100) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) mkdir(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000002c0)={0x0, @multicast2, @multicast2}, &(0x7f00000010c0)=0xc) bind$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x12, r5, 0x1, 0x2, 0x6, @broadcast}, 0x14) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$sock_netdev_private(0xffffffffffffffff, 0x89ef, &(0x7f0000000380)="c88b0d8dfbda8b1daa336e618d716ac94b750e196c42424766191f3c38161dede63ba6699f54c3b0c425c31df09e31e8cdbe6c9ee468561328418cf6a015d43d808c5e4748d0765cb63b282cf9e629d860ab8165d33a5368aec355161a0ef645dec3c5e7fa2e90cb7f99c3e110961f02d986281fb60394569fcb6dfbd3efbec599044ce3752f051ca9912ae505468284d0ee0882682ea30dc46ec6fd18119f6847d191afa5350436354ff88074058a035df09c62912beaa184301e43126993fbfb20c771b886e2d60878768e467c810e2df12faa3881a5e463e7697e22e17b163b74b47338fa1f42d38cc594e986e8a868a58cd86e8f81d19ae941404890bf9c2fee3ea075df72e2099f886e26c7e08f0ec22ebe7ad8fe4a8ad0a93976794fe16a87d19027a3c92722714b3dd7aeee4b58a7f6ce34010486bed638534f53c4262fa8fa136056d411ed784c44dcb645911e668cafa2e319da09d9544d6272a45b564f8204a93b276610c9058df681ef1a9838f0648b98334af98fe289cfa4a0075eaf442138c60efa76bb72d34675fbf460de01633813dcdeadd181f8504deba2e649f3212ab3877286fc45ee180bd133a626568353764adbf4bb3737f2205dbe02febb4c97563a2e2ddbe27e62c4eced24f74b2d30d15352e0da8350b409cc7e439bb1ca130049e4edc0db4d2e4c7629c2e605c0ac6e1868174ad9969e9dc50c8bd67780853c3a8429adace254d1a37975fc809b63f4aa639818dc0c8a0145225c5dd1129603f4559ca55e3b609751bf3a41698e12d483e1063fb523af53a9782c6b6ce1b2785427ffc20c66cf5224e354cb2d836168b008d7b6d9641589d40d1d2bf4888a2d01c40d773ae2becd3bf0d16468ef47eb838e7f2f053ea4146ed5553fa18fb94f49f86fbdadd227008d6ec6ca4d298a8ed9363c02b112e81ab27b81be254a34af6f9319d6fe7adf79264c4d68aec75c7e1b3535db1360fc0f50b0f66c0e51b2e442c974b89d47ce112236442b1d72502baddafa9bd6b56d218a86f271dbc15c35eefde30abf8896378d9d6c4c1e19f8b60d0d53b4bdf45fcdb4befb5395abf5b0a54db710cb4d9c28a022fc273808ac6fdebfb547f1bf4ce7cc9e9a3c6d392146cab2db0ea622890c1073138c070a943ce8583c0624811cdcad8d34efb5a2893116576dccd49eaa97fb121db843db70344aee11400355f68eef53d1926ca362d34abaa76025002cf618e2d04bea6e6088778c94b7b0b05b0eaea678a3f590921012a6ffcb6cddec925fc77c4c0dd691bdd507cea711fc26ec27bc17c0deae7f5ea0c7ae88468dc82eabd1e20e6ec72d4e89786c6e2361ec83d57c9bd06c570283e42bff3a690ae1eb29e9e9e6d099e9e62e3c5957416cec6f1981e6894d56395f2623956d6e1c2b6815eb64f3d414d438149bce650310d582d974e6606d48cd8028930a99a2d6ff31005be451d7e9223f8c9a09ef48be6ef9e7a321b874d05fe69e0b9a97c6538439d5f096e6699e0b7498ab8c5f5f5b2b568a540fc5561a0add21d618185452cd9306707439af6210a19a2ea14762733b70a486e89539c917abb8749cbe2357269a086450522ed0970d36e2d2836cb0027218753fa25e817255dd1431f2f21148adcde9e8e132086416f219e5b4ef1c30950b8c33e92dc04ee6e4d5cadb0ee04f4acf7b8845443f163067787e88ed5c169c3cc8fdd696f8f42f1296efa750e22e2874a7e104bfb3438612645b05790d1f50c17f288b768ae933de9ef9062a696c79dddf4c33b2d7e51295622547805736dde397aa893d09c343cc2e71cddfe289fbce26dc9527c9c7e9b65e6f1df99fe550e1f6c7f3a289cd64090052a63616d091302bcf3f2ac5fb0cc099a6704c33740ebfc76271a7c5d3f9727cb54ce7f693b9f3f6a02dde4fd117eb748ad60cb320815101c30ae5a412b5ef513e6d94ff9cdc92a0ae219de538f56a6dbb8e7d703ff239a2a0be8c4f1661bf12f079a5f6bc12e52b0147acf2bd5aad1a1a55730eedf63a02d89e84bb397b6d60e5ba539ab42ca7294477c49ef499d4f616cd30056f3e9ea10ef4e8a71260ea0ed9a38919532f7e0d14e745f7806bbba64da057acf0ddceec4bd69552c4562c112fc8e265a07e183ecb36610747bf3aad46") socket$inet6(0xa, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:42:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:29 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:30 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:30 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 503.983694][T15312] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[15312] 20:42:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x0, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:30 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) [ 504.064194][T15320] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[15320] 20:42:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getpid() setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000034000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = shmat(0x0, &(0x7f0000ff3000/0x3000)=nil, 0x4000) shmdt(r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="97bf5a5de8384e0ed1799224ccbedb8f000000000000001823f9f3540a7fba6007ab76a0de92f64daedb7d"], 0x34) shutdown(0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002600)=""/4102, 0x1006}], 0x1, 0x0, 0x0, 0x7115}, 0x100) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) mkdir(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000002c0)={0x0, @multicast2, @multicast2}, &(0x7f00000010c0)=0xc) bind$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x12, r5, 0x1, 0x2, 0x6, @broadcast}, 0x14) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$sock_netdev_private(0xffffffffffffffff, 0x89ef, &(0x7f0000000380)="c88b0d8dfbda8b1daa336e618d716ac94b750e196c42424766191f3c38161dede63ba6699f54c3b0c425c31df09e31e8cdbe6c9ee468561328418cf6a015d43d808c5e4748d0765cb63b282cf9e629d860ab8165d33a5368aec355161a0ef645dec3c5e7fa2e90cb7f99c3e110961f02d986281fb60394569fcb6dfbd3efbec599044ce3752f051ca9912ae505468284d0ee0882682ea30dc46ec6fd18119f6847d191afa5350436354ff88074058a035df09c62912beaa184301e43126993fbfb20c771b886e2d60878768e467c810e2df12faa3881a5e463e7697e22e17b163b74b47338fa1f42d38cc594e986e8a868a58cd86e8f81d19ae941404890bf9c2fee3ea075df72e2099f886e26c7e08f0ec22ebe7ad8fe4a8ad0a93976794fe16a87d19027a3c92722714b3dd7aeee4b58a7f6ce34010486bed638534f53c4262fa8fa136056d411ed784c44dcb645911e668cafa2e319da09d9544d6272a45b564f8204a93b276610c9058df681ef1a9838f0648b98334af98fe289cfa4a0075eaf442138c60efa76bb72d34675fbf460de01633813dcdeadd181f8504deba2e649f3212ab3877286fc45ee180bd133a626568353764adbf4bb3737f2205dbe02febb4c97563a2e2ddbe27e62c4eced24f74b2d30d15352e0da8350b409cc7e439bb1ca130049e4edc0db4d2e4c7629c2e605c0ac6e1868174ad9969e9dc50c8bd67780853c3a8429adace254d1a37975fc809b63f4aa639818dc0c8a0145225c5dd1129603f4559ca55e3b609751bf3a41698e12d483e1063fb523af53a9782c6b6ce1b2785427ffc20c66cf5224e354cb2d836168b008d7b6d9641589d40d1d2bf4888a2d01c40d773ae2becd3bf0d16468ef47eb838e7f2f053ea4146ed5553fa18fb94f49f86fbdadd227008d6ec6ca4d298a8ed9363c02b112e81ab27b81be254a34af6f9319d6fe7adf79264c4d68aec75c7e1b3535db1360fc0f50b0f66c0e51b2e442c974b89d47ce112236442b1d72502baddafa9bd6b56d218a86f271dbc15c35eefde30abf8896378d9d6c4c1e19f8b60d0d53b4bdf45fcdb4befb5395abf5b0a54db710cb4d9c28a022fc273808ac6fdebfb547f1bf4ce7cc9e9a3c6d392146cab2db0ea622890c1073138c070a943ce8583c0624811cdcad8d34efb5a2893116576dccd49eaa97fb121db843db70344aee11400355f68eef53d1926ca362d34abaa76025002cf618e2d04bea6e6088778c94b7b0b05b0eaea678a3f590921012a6ffcb6cddec925fc77c4c0dd691bdd507cea711fc26ec27bc17c0deae7f5ea0c7ae88468dc82eabd1e20e6ec72d4e89786c6e2361ec83d57c9bd06c570283e42bff3a690ae1eb29e9e9e6d099e9e62e3c5957416cec6f1981e6894d56395f2623956d6e1c2b6815eb64f3d414d438149bce650310d582d974e6606d48cd8028930a99a2d6ff31005be451d7e9223f8c9a09ef48be6ef9e7a321b874d05fe69e0b9a97c6538439d5f096e6699e0b7498ab8c5f5f5b2b568a540fc5561a0add21d618185452cd9306707439af6210a19a2ea14762733b70a486e89539c917abb8749cbe2357269a086450522ed0970d36e2d2836cb0027218753fa25e817255dd1431f2f21148adcde9e8e132086416f219e5b4ef1c30950b8c33e92dc04ee6e4d5cadb0ee04f4acf7b8845443f163067787e88ed5c169c3cc8fdd696f8f42f1296efa750e22e2874a7e104bfb3438612645b05790d1f50c17f288b768ae933de9ef9062a696c79dddf4c33b2d7e51295622547805736dde397aa893d09c343cc2e71cddfe289fbce26dc9527c9c7e9b65e6f1df99fe550e1f6c7f3a289cd64090052a63616d091302bcf3f2ac5fb0cc099a6704c33740ebfc76271a7c5d3f9727cb54ce7f693b9f3f6a02dde4fd117eb748ad60cb320815101c30ae5a412b5ef513e6d94ff9cdc92a0ae219de538f56a6dbb8e7d703ff239a2a0be8c4f1661bf12f079a5f6bc12e52b0147acf2bd5aad1a1a55730eedf63a02d89e84bb397b6d60e5ba539ab42ca7294477c49ef499d4f616cd30056f3e9ea10ef4e8a71260ea0ed9a38919532f7e0d14e745f7806bbba64da057acf0ddceec4bd69552c4562c112fc8e265a07e183ecb36610747bf3aad46") socket$inet6(0xa, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:42:30 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 504.336124][T15403] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[15403] 20:42:30 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x0, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:30 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) [ 504.541964][T15444] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[15444] [ 504.694927][T15456] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[15456] 20:42:31 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) shmget$private(0x0, 0x4000, 0x2c000209, &(0x7f0000ffa000/0x4000)=nil) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x2000) socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route(r1, 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 20:42:31 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:31 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:31 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x0, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 505.083182][T15480] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[15480] 20:42:31 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:31 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) [ 505.153869][T15484] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[15484] 20:42:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:42:31 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 505.426366][T15498] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[15498] 20:42:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:31 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:31 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 505.605319][T15610] ptrace attach of "/root/syz-executor.0"[8016] was attempted by "/root/syz-executor.0"[15610] 20:42:32 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:32 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:32 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) [ 506.131126][T15645] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 506.211496][T15645] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 506.238299][T15645] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001d000507d25a080d3076950a6789dad39680648c63940d0524fc6010000a400a000000053582c137153e", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x9, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfff, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)={r1}, 0xc) 20:42:32 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:32 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:32 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:32 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 506.473018][T15665] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 20:42:32 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x0, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 506.647956][T15673] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 506.690859][T15673] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 506.703032][T15673] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:33 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001d000507d25a080d3076950a6789dad39680648c63940d0524fc6010000a400a000000053582c137153e", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 20:42:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x0, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:33 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 506.954639][T15729] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 506.972932][T15799] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 20:42:33 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001d000507d25a080d3076950a6789dad39680648c63940d0524fc6010000a400a000000053582c137153e", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 20:42:33 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x0, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 507.252967][T15814] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:33 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 507.315800][T15814] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 507.349814][T15814] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 507.407183][T15819] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 20:42:33 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:33 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:33 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001d000507d25a080d3076950a6789dad39680648c63940d0524fc6010000a400a000000053582c137153e", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 20:42:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 507.676237][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 507.716353][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:34 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 507.751586][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 507.911030][T15858] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 20:42:34 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:34 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000000d000040050004a900000000c1eb00000000004000000000010000000000080000000000ff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x485}]}) 20:42:34 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) inotify_init1(0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 508.178562][T15872] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 508.241408][T15872] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 508.250530][T15872] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:34 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:34 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0xd, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x6, 0x0, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b0b, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ab75}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x82) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x82) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') getdents(r3, &(0x7f00000000c0)=""/31, 0x77c) 20:42:34 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) inotify_init1(0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 508.617524][T15904] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 508.663345][T15904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 508.680643][T15904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:35 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800100005000000b17c5018da4a96b4d816c2bd88e64d354471b7881a78669b22c7729ae4773927bca19f12001719ef1ac8a1e4b7319aaa1501593d65a16222ed34557dfce7d593e7f0383bf5dd3c0c07fcc8b9f2a4411f745e051eefcf0768a41fe51cc774c88d83a6a7276951a872f97c69cb9a432569414599f5495fed24049a553a42099c60fde4a2c62cfbeaf941d7e5285177d27351dc031400123091f58d93eae12818ff6f138ff7fe560fdd669c20cde28c6bd9a59cd2a096280914c362c0a4c3fed658395c139729b0a8cfb53f44fb5a"], 0x30}}, 0x0) 20:42:35 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:35 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) inotify_init1(0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 508.964872][T15928] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 20:42:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000), 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:35 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 509.164215][T15928] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.209733][T15928] bridge0: port 2(bridge_slave_1) entered disabled state 20:42:35 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000), 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 509.315360][T15938] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 509.378660][T15938] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:35 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 509.437719][T15938] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 509.493270][T15954] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 20:42:35 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:35 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:36 executing program 1: 20:42:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000), 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:36 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:36 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 509.950944][T15980] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 510.059295][T15980] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 510.067748][T15980] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:36 executing program 1: 20:42:36 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:36 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:36 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:36 executing program 1: 20:42:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:36 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:36 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 510.723158][T16023] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:37 executing program 1: 20:42:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 510.818540][T16023] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 510.868670][T16023] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:37 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:37 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:37 executing program 1: 20:42:37 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:37 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:37 executing program 1: 20:42:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) [ 511.452169][T16061] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:37 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 511.505236][T16061] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:37 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 511.591848][T16061] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:37 executing program 1: 20:42:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 20:42:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:38 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:38 executing program 1: 20:42:38 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 512.149650][T16100] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:38 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 512.209077][T16100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 20:42:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:38 executing program 1: [ 512.260635][T16100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:38 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:38 executing program 1: 20:42:38 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:39 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:39 executing program 1: [ 512.897274][T16135] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:39 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 512.962173][T16135] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:39 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 513.029059][T16135] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:39 executing program 1: 20:42:39 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:39 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:39 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:39 executing program 1: 20:42:39 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 513.537850][T16269] __report_access: 1 callbacks suppressed [ 513.537867][T16269] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[16269] [ 513.612446][T16274] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:39 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:39 executing program 1: [ 513.665780][T16274] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 513.695344][T16274] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:40 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 20:42:40 executing program 1: 20:42:40 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:40 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 514.171691][T16394] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[16394] [ 514.213009][T16394] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:40 executing program 1: [ 514.282030][T16394] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 514.359986][T16394] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:40 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:40 executing program 1: 20:42:40 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:40 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:41 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00009c1000)=0xff, 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 514.843480][T16530] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[16530] 20:42:41 executing program 1: [ 514.931558][T16623] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 514.972392][T16623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 514.992324][T16623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:41 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:41 executing program 5: 20:42:41 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:41 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:41 executing program 1: [ 515.380915][T16656] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[16656] [ 515.427664][T16656] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:41 executing program 5: [ 515.511469][T16656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:41 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 515.561017][T16656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:41 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:42 executing program 1: 20:42:42 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:42 executing program 5: 20:42:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:42 executing program 1: 20:42:42 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 516.027755][T16876] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[16876] 20:42:42 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 516.128676][T16880] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x4000000000000001, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) socket$xdp(0x2c, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) eventfd(0x0) openat$random(0xffffffffffffff9c, &(0x7f0000003440)='/dev/urandom\x00', 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000003ec0)='/dev/vcs\x00', 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) [ 516.212336][T16880] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x7eb, 0x0) [ 516.277814][T16880] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:42 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 516.459618][ T27] audit: type=1804 audit(1577565762.719:33): pid=16968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir526162071/syzkaller.dZmR1Q/382/bus" dev="sda1" ino=17624 res=1 20:42:42 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:42 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000080)="080db5055e0bcfe8476071") ioctl$KDSETLED(r1, 0x80045440, 0x0) [ 516.604656][ T27] audit: type=1804 audit(1577565762.769:34): pid=16968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir526162071/syzkaller.dZmR1Q/382/bus" dev="sda1" ino=17624 res=1 20:42:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:42 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 516.733036][T17004] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[17004] [ 516.787205][T17004] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 516.808057][ T27] audit: type=1804 audit(1577565762.799:35): pid=16968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir526162071/syzkaller.dZmR1Q/382/bus" dev="sda1" ino=17624 res=1 [ 516.812257][T17004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 516.845060][T17004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:43 executing program 0: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 516.942649][ T27] audit: type=1804 audit(1577565762.809:36): pid=16968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir526162071/syzkaller.dZmR1Q/382/bus" dev="sda1" ino=17624 res=1 20:42:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000007a850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb9, 0x2, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000fffff0000ab00638877fb08061421e9", 0x0, 0x100, 0x0, 0x1f4}, 0x28) 20:42:43 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000180)='smaps\x00') [ 516.987903][ T27] audit: type=1804 audit(1577565762.839:37): pid=16968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir526162071/syzkaller.dZmR1Q/382/bus" dev="sda1" ino=17624 res=1 20:42:43 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 517.082691][ T27] audit: type=1804 audit(1577565762.849:38): pid=16968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir526162071/syzkaller.dZmR1Q/382/bus" dev="sda1" ino=17624 res=1 20:42:43 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 517.244220][ T27] audit: type=1804 audit(1577565762.859:39): pid=16968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir526162071/syzkaller.dZmR1Q/382/bus" dev="sda1" ino=17624 res=1 20:42:43 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000080)="080db5055e0bcfe8476071") ioctl$KDSETLED(r1, 0x5600, 0x0) [ 517.330016][T17131] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[17131] [ 517.391177][ T27] audit: type=1804 audit(1577565762.909:40): pid=16968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir526162071/syzkaller.dZmR1Q/382/bus" dev="sda1" ino=17624 res=1 20:42:43 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1ff) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004180)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="101900008981008bb300000000000000"], 0x10}}], 0x2, 0x0) 20:42:43 executing program 0: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 517.440192][T17134] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 517.505971][T17134] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 517.517205][ T27] audit: type=1804 audit(1577565762.949:41): pid=16968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir526162071/syzkaller.dZmR1Q/382/bus" dev="sda1" ino=17624 res=1 [ 517.550102][T17134] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:43 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:43 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x21}, 0xe) [ 517.642831][ T27] audit: type=1804 audit(1577565762.959:42): pid=16968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir526162071/syzkaller.dZmR1Q/382/bus" dev="sda1" ino=17624 res=1 20:42:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:44 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000000)={0x0}) timer_settime(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x989680}, {r1}}, 0x0) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000440)=[{&(0x7f0000001680)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r4 = gettid() r5 = syz_open_procfs(r4, &(0x7f0000000440)='syscall\x00') sendfile(r3, r5, 0x0, 0x1) tkill(r0, 0x1000000000016) 20:42:44 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:44 executing program 0: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0xf4, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x5, 0x0, 0x9}) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a0000000000000400000000000000000000006a6c434726591cef000000ebef010001981400f83f0000000000edfffd"], 0x48}}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 518.014005][T17360] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[17360] [ 518.089500][T17360] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:44 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 518.156544][T17360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:44 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0)="1a8c443d3a568c81cc096aa87ddab0f1b182da383fd71795f41053261e63b0b9f1283f7431b6146106716c21b43625f9194bf4b6a5dba53c46b82862a2f804121cda7e6be8fd507bb1545de629746d878f10be8036e98a270c42", 0x5a, 0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000380)=""/239, 0xff4e, 0x0, 0x0, 0x307) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @dev, 0x8}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x0, @local}], 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x2}, @var={0x4, 0x0, 0x0, 0xe, 0x5}]}}, 0x0, 0x36}, 0x20) [ 518.202247][T17360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:44 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:44 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:44 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @dev, 0x8}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d24000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) [ 518.620314][T17493] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[17493] 20:42:44 executing program 5: [ 518.663162][T17493] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 518.680774][T17493] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 518.689461][T17493] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:45 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:45 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:45 executing program 1: 20:42:45 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:45 executing program 5: 20:42:45 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 519.119431][T17613] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[17613] [ 519.159274][T17521] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:45 executing program 1: 20:42:45 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 519.194621][T17521] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 519.214159][T17521] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:45 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:45 executing program 5: 20:42:45 executing program 1: 20:42:45 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:45 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:46 executing program 5: 20:42:46 executing program 1: [ 519.751730][T17736] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[17736] [ 519.829809][T17738] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:46 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 519.873019][T17738] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:46 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 519.927520][T17738] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:46 executing program 5: 20:42:46 executing program 1: 20:42:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:46 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:46 executing program 5: 20:42:46 executing program 1: 20:42:46 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:46 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 520.473144][T17860] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[17860] [ 520.565649][T17866] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:46 executing program 5: [ 520.638800][T17866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:46 executing program 1: [ 520.687240][T17866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:47 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:47 executing program 5: 20:42:47 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:47 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:47 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:47 executing program 1: 20:42:47 executing program 5: 20:42:47 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 521.240243][T18076] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[18076] 20:42:47 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:47 executing program 1: [ 521.326520][T18093] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 521.392389][T18093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 521.422038][T18093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:47 executing program 5: 20:42:47 executing program 1: 20:42:47 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:47 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:47 executing program 5: 20:42:47 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 521.894225][T18217] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[18217] [ 521.940853][T18217] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 521.968294][T18217] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 521.976820][T18217] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:48 executing program 1: 20:42:48 executing program 5: 20:42:48 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:48 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:48 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:48 executing program 1: 20:42:48 executing program 5: 20:42:48 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:48 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 522.340812][T18336] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[18336] [ 522.413286][T18342] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:48 executing program 5: [ 522.473780][T18342] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 522.490759][T18342] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:48 executing program 1: 20:42:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:49 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:49 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:49 executing program 1: 20:42:49 executing program 5: 20:42:49 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:49 executing program 1: 20:42:49 executing program 5: [ 523.218062][T18468] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[18468] [ 523.306404][T18472] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:49 executing program 5: 20:42:49 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 523.376732][T18472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 523.420745][T18472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:49 executing program 1: 20:42:49 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:50 executing program 5: 20:42:50 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:50 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:50 executing program 1: 20:42:50 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:50 executing program 5: 20:42:50 executing program 1: [ 524.283744][T18703] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[18703] [ 524.360328][T18805] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:50 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:50 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 524.416766][T18805] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 524.439250][T18805] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:50 executing program 1: 20:42:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:50 executing program 5: 20:42:50 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:51 executing program 1: 20:42:51 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:51 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:51 executing program 5: 20:42:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 524.915538][T18928] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[18928] [ 524.998141][T18928] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 525.083298][T18928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 525.128091][T18928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:51 executing program 5: 20:42:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:51 executing program 1: 20:42:51 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:51 executing program 4: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:51 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:51 executing program 1: 20:42:51 executing program 5: 20:42:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:51 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:52 executing program 1: 20:42:52 executing program 5: [ 525.782036][T19122] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[19122] [ 525.856106][T19122] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 525.904977][T19122] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 525.925904][T19122] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:52 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:52 executing program 1: 20:42:52 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:52 executing program 4: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:52 executing program 5: 20:42:52 executing program 1: 20:42:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:52 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:52 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc9"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:52 executing program 5: [ 526.557083][T19294] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[19294] 20:42:52 executing program 1: 20:42:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 526.640257][T19298] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 526.720250][T19298] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 526.747665][T19298] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:53 executing program 5: 20:42:53 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:53 executing program 1: 20:42:53 executing program 4: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:53 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:53 executing program 5: 20:42:53 executing program 1: [ 527.291139][T19423] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[19423] 20:42:53 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 527.398195][T19430] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:53 executing program 5: 20:42:53 executing program 1: [ 527.467981][T19430] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 527.489747][T19430] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:53 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:53 executing program 5: 20:42:54 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:54 executing program 1: 20:42:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:54 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:54 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 20:42:54 executing program 1: geteuid() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) umount2(0x0, 0xb) [ 528.114471][T19658] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[19658] 20:42:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 528.156246][T19658] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:54 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:54 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 528.226412][T19658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 528.300537][T19658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:54 executing program 5: 20:42:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:54 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:54 executing program 1: 20:42:54 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:55 executing program 5: 20:42:55 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 528.842346][T19786] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[19786] 20:42:55 executing program 1: [ 528.934705][T19791] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:55 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e33, 0x0, @mcast2}, 0x1c) [ 529.005588][T19791] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 529.048592][T19791] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:55 executing program 1: r0 = socket(0x10, 0x2, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0xfffffffffffffe31, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="280000001900fdff0085ed3c90aee34306e605000800030006000000a0fbe900020a1a779f60fc4d4275b6aa76be2a2bb7871cf04900000000040080008a7dad9840e5233c3f60a6098576c88433a06eccd8a86d86c4dc8047"], 0x28}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000300)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}, {&(0x7f0000000100)="2621ac085c69b17809b42cb013ede48b21d82d06322c45bf1f59f126747308a62b5009fe066cbcdd4d7743889638725e807465e4c2596ae711bfade298e44ede896d51b68d9e5bb6b9823c88fe07e5355ba0c499"}], 0x0, &(0x7f00000001c0)}], 0x1be, 0x0) 20:42:55 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:55 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:42:55 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 529.495323][T19913] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[19913] [ 529.568257][T19913] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 529.607212][T19913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r0, 0x10e, 0xb, &(0x7f0000000240)="75cc11ec", 0x4) r1 = socket$inet6(0xa, 0x80003, 0x6b) close(0xffffffffffffffff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="080db5055e0bcfe8476071") sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="24000000200007041dfffd946f610500020000001f00000000000800050006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 20:42:55 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x9) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 20:42:55 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 529.654533][T19913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:56 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 529.787937][T20028] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 529.839801][T20028] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:42:56 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f0000000040)="74533e84b203091d54458c61f83f901b33032769", 0x14) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000026c0)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 20:42:56 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 530.063015][T20136] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[20136] [ 530.083563][T20136] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 530.098813][T20136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:56 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 530.108689][T20136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:56 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:56 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) umount2(0x0, 0x0) 20:42:56 executing program 5: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') socket$inet6(0xa, 0x1, 0x3e) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x0, 0xf2be, 0x0, 0x401, 0x100}) pread64(r0, &(0x7f0000001680)=""/4096, 0x1000, 0x48) semctl$GETZCNT(0x0, 0x0, 0xf, 0x0) [ 530.236326][T20148] ptrace attach of "/root/syz-executor.1"[20147] was attempted by "/root/syz-executor.1"[20148] [ 530.492232][T20251] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[20251] [ 530.603103][T20263] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 530.633456][T20263] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 530.652953][T20263] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:57 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:57 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:57 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x5890, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 20:42:57 executing program 5: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') socket$inet6(0xa, 0x1, 0x3e) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x0, 0xf2be, 0x0, 0x401, 0x100}) pread64(r0, &(0x7f0000001680)=""/4096, 0x1000, 0x48) semctl$GETZCNT(0x0, 0x0, 0xf, 0x0) 20:42:57 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 531.003319][T20342] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[20342] 20:42:57 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 531.077325][T20342] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:42:57 executing program 5: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') socket$inet6(0xa, 0x1, 0x3e) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x0, 0xf2be, 0x0, 0x401, 0x100}) pread64(r0, &(0x7f0000001680)=""/4096, 0x1000, 0x48) semctl$GETZCNT(0x0, 0x0, 0xf, 0x0) 20:42:57 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 531.128322][T20342] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:57 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') r1 = socket$inet6(0xa, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x400, 0x401, 0x0, r3}) pread64(r0, &(0x7f0000001680)=""/4096, 0x1000, 0x48) semctl$GETZCNT(0x0, 0x0, 0xf, 0x0) [ 531.170183][T20342] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:57 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:57 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 531.614102][T20511] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[20511] [ 531.696181][T20511] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 531.731164][T20511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:58 executing program 5: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x4000, 0x0) dup(0xffffffffffffffff) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0, 0x0, 0x7115}, 0x100) 20:42:58 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 531.776651][T20511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:58 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') r1 = socket$inet6(0xa, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x400, 0x401, 0x0, r3}) pread64(r0, &(0x7f0000001680)=""/4096, 0x1000, 0x48) semctl$GETZCNT(0x0, 0x0, 0xf, 0x0) 20:42:58 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:58 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:58 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockname(r0, 0x0, 0x0) 20:42:58 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 532.226979][T20639] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[20639] [ 532.273973][T20639] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 532.298322][T20639] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') socket$inet6(0xa, 0x1, 0x3e) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) pread64(r0, &(0x7f0000001680)=""/4096, 0x1000, 0x48) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) [ 532.338965][T20639] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:58 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) close(r2) socket$inet6(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a290930206040208000001028140003900090035004c0a010000001900050023", 0x2d}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffdd, 0x0) 20:42:58 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:58 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 532.809678][T20762] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[20762] 20:42:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:42:59 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 532.898294][T20766] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 532.981198][T20766] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:42:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') socket$inet6(0xa, 0x1, 0x3e) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) pread64(r0, &(0x7f0000001680)=""/4096, 0x1000, 0x48) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) 20:42:59 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 533.022333][T20766] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:42:59 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:42:59 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:42:59 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:42:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') socket$inet6(0xa, 0x1, 0x3e) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) pread64(r0, &(0x7f0000001680)=""/4096, 0x1000, 0x48) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) [ 533.605181][T20893] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[20893] 20:42:59 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mkdir(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') geteuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4, &(0x7f0000000840)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7d66646e6f3d6d7be22279535c199b3ff24a3ffdea6f02a48e93c435f3578cb56f88f7075f1134dbab1d75408a0b", @ANYRESHEX, @ANYRESHEX, @ANYRESHEX, @ANYBLOB]) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) [ 533.698650][T20981] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:43:00 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 533.798279][T20981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 533.878353][T20981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:00 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 533.920002][T21004] 9pnet: Insufficient options for proto=fd 20:43:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199bb606fdcc1e49273879e0baa435f4f812cf94353ab7f805743277424ac2c38814808b12ae8de84c2d3737a2ad18c91892b6f8eeb297a3991484c597c6f191fec56d500fd56f8bbac3988978e9577637ad469d9af361be097e58832c9c46f84587dc931e6c94667d826ed2840b005fe345d52a97de7d412a52b23dfbef294fe774e02f9a242c01ca895f9403601925ed27011f070eb1c6ce6c9ba6f8bb3935f92c5a7106bd8e67504e9693c012d5e404008b7980dc194cb6c9e4bd53957fd13bfa3244ce38465a0e617a614734a4d3f7b1fb311762f6130f05629858dced68b06c733ed25e20f33211d16b1ae4abd7781fcc54c2b7fa6cb63e2b0fff64f1821281a605adef6461e2368ddbf11605df710a1c1827505050a4daf61ed85681a2b0c7b403361c0d3c79bbd9c6e8dc04def4c29021bf9d2745c0ef807f6222d9d19d2e6d1ae722bc8045c726dad5ec83a58f2d87f7ba5bb1cd33fd8e91cf3d5f3f8fcfff2252a1cedd422ee01787bd15e2f012ff82b51b87516f3cb85c6c7b5e0b1064ee0c359ab5239f1a37bdb7779063e0d386faf45d00d65edc153b6176e2bfeaf20c80baf5f0bfb4c1938bdd8e043e0f6fa229c1e88171b3ca4a374f99a0090c40e77c71e2e536d18844795ee9a9e08af29522e7e2f7e1f4ee10380eb2d3cad0acd3ea4d99a0832bec6b6bfd2f10450b234ebbe6227433964edbdffb6ec58300424cf1733b97a7ca431974de6e9f380b8d7cd27", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:43:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') socket$inet6(0xa, 0x1, 0x3e) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) pread64(r0, &(0x7f0000001680)=""/4096, 0x1000, 0x48) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) 20:43:00 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x87, 0x29, 0x5, 0x3f, 0x0, 0x9, 0x4080, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x10102, 0x0, 0x4, 0x5, 0xffffffff, 0x7}, 0x0, 0x4, r0, 0x8) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, r0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgid(r1) mlockall(0x3) ioctl$void(0xffffffffffffffff, 0x0) getpid() 20:43:00 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:43:00 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:43:00 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 534.581710][T21133] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[21133] 20:43:00 executing program 1: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) [ 534.675690][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 534.759245][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:43:01 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 534.799603][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:01 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:43:01 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:01 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:43:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 535.305909][T21252] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[21252] [ 535.419938][T21254] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 535.515263][T21254] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 535.587466][T21254] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:01 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:02 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:43:02 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mkdir(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') geteuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7d66646e6f3d6d7be22279535c199b", @ANYBLOB, @ANYRESHEX]) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000980)=ANY=[], 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x88001) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, 0x0) 20:43:02 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:43:02 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000080)="080db5055e0bcfe8476071") ioctl$KDSETLED(r1, 0x4b32, 0x0) 20:43:02 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:43:02 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:43:02 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 536.441998][T21566] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[21566] [ 536.492831][T21487] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 536.514734][T21592] 9pnet: Insufficient options for proto=fd 20:43:02 executing program 1: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000007a850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb9, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000fffff0000ab00638877fb08061421e9", 0x0, 0x100, 0x0, 0x1f4}, 0x28) [ 536.565789][T21487] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:43:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x3b3}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:43:02 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 536.628913][T21487] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 536.645115][T21597] 9pnet: Insufficient options for proto=fd 20:43:03 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 20:43:03 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x50, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087715082cf0400b0eb04001200160011000586f9835b3f2f009148790028f85acc7c45", 0x2e}], 0x1}, 0x0) setresuid(0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) stat(0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:43:03 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:43:03 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:43:03 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 537.333435][T21729] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[21729] 20:43:03 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 537.408003][T21739] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:43:03 executing program 1: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000240)={{0x1cf, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x8}, "0504"}, 0x22) [ 537.489551][T21739] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 537.539285][T21739] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:03 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:43:03 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:03 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:43:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 537.930790][T21961] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[21961] [ 537.991139][T21965] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 538.008078][T21965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 538.039483][T21965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:06 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 20:43:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc158bb2b03b5b2461179f5f90bba001b5080da6218a8106df2858ec973328e5a2c078a3fe3b52020203517e25ee74e82ba80a0fa881e68", 0x89}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:43:06 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:43:06 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:06 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:43:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 539.978574][T21973] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[21973] [ 540.008748][T21973] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:43:06 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 540.041582][T21973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 540.067775][T21973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:06 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:43:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0), 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:43:06 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:06 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 540.319546][T22091] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[22091] [ 540.355282][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 540.376875][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 540.422632][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:06 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:43:13 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 20:43:13 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0), 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:43:13 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:43:13 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x0, 0x0, 0x102}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:43:13 executing program 1: socket$packet(0x11, 0x0, 0x300) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080), 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) shutdown(0xffffffffffffffff, 0x1) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) [ 547.155133][T22220] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[22220] 20:43:13 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:43:13 executing program 1: [ 547.259901][T22300] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:43:13 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 547.332750][T22300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 547.370246][T22300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:13 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:43:13 executing program 1: 20:43:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0), 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:43:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 20:43:19 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:43:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) gettid() write$cgroup_int(r0, &(0x7f0000000200), 0x43400) 20:43:19 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:43:19 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 553.679684][T22463] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[22463] 20:43:20 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) [ 553.726929][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 553.726962][ T27] audit: type=1804 audit(1577565799.989:50): pid=22465 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir531803662/syzkaller.f40JJE/434/memory.events" dev="sda1" ino=16823 res=1 [ 553.771652][T22521] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 553.809818][T22521] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 553.841723][T22521] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:20 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:20 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:43:20 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) [ 554.028601][ T27] audit: type=1804 audit(1577565800.289:51): pid=22574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir531803662/syzkaller.f40JJE/434/memory.events" dev="sda1" ino=16823 res=1 20:43:20 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 554.129698][T22678] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[22678] 20:43:20 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) [ 554.174940][T22678] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 554.247663][T22678] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 554.274798][T22678] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 554.323159][T22465] syz-executor.1 (22465) used greatest stack depth: 10120 bytes left 20:43:29 executing program 5: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000007a850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb9, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000fffff0000ab00638877fb08061421e9", 0x0, 0x100, 0x0, 0x1f4}, 0x28) 20:43:29 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 20:43:29 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:43:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x14}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x59}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:43:29 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 562.921075][T22806] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[22806] 20:43:29 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 20:43:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 562.979953][T22806] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 562.992548][T22806] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 563.010335][T22806] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:29 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:29 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 563.135263][T22916] [ 563.142205][T22916] ********************************************************** [ 563.172322][T22916] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** 20:43:29 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) [ 563.208612][T22916] ** ** [ 563.245308][T22916] ** trace_printk() being used. Allocating extra memory. ** [ 563.300447][T22916] ** ** 20:43:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 563.341779][T22916] ** This means that this is a DEBUG kernel and it is ** [ 563.357038][T22916] ** unsafe for production use. ** [ 563.388212][T22916] ** ** [ 563.394168][T22924] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 563.409324][T22916] ** If you see this message and you are not debugging ** [ 563.418903][T22916] ** the kernel, report this immediately to your vendor! ** [ 563.442568][T22916] ** ** [ 563.453477][T22924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 563.461365][T22916] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 563.480672][T22916] ********************************************************** [ 563.487709][T22924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:38 executing program 5: ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x0, @hyper}, 0x10) listen(0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x0, @hyper}, 0x10) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) socket$packet(0x11, 0x0, 0x300) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) 20:43:38 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 20:43:38 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="89ea03ff0a0020c5dd5b0f160f748b14f0330eea96541bb26844fcffffffffffc863000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938857b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0b652217215de618cc65016d5ab11eea005b283b0b224d28c79c54b3969e7328428f6c342ca01c28f490e04f77401614ac5d1361d38dfaeef1c4a45b2e2f74457496e138bc54a4b6ed2cfa9fbf194c48b9cf5e7c49c8e59c464ad4e44ca76cd7b4ab0123404ea03b0000d7d37b0215d1b16d370eb1af0441ed466fa8ba14323f6b2c00a28f585d57354f0541f9887dce1691ed813121dd578062fdf25aab2fce3199bc933528de77e3cb6ce87c4f1750349afd23c2b63"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:43:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:43:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 572.264111][T23045] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:43:38 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) [ 572.315172][T23045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 572.340652][T23045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:43:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:43:38 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 20:43:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:43:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}], 0x5}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 572.700337][T23162] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 572.730306][T23162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 572.767459][T23162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:47 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 20:43:47 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x169a01) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r0, 0x127f, &(0x7f0000000000)={0xa00, 0x60000, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b470000023250dd3f0a272136c288db3dff5e4ff07000000f7f4383d5860cd240780ff00800000000000004616293c6983597200000000000000000000000002", "141f99c62c86111c43af0000000000000b87010000000008c19881dacd1d65fdfdffa531d0010012eabf02d4aa56e482fdff0000000000000200", "020000000000000000100000000000008000"}) 20:43:47 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 20:43:47 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r0, 0x0) 20:43:47 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:43:47 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {0x0}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:43:47 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 581.623992][T23287] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 581.638412][T23287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 581.657543][T23287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000200)=""/198, 0x0, 0xc6, 0x1}, 0x20) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000200)="3081", 0x3, r0) 20:43:48 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r0, 0x0) 20:43:48 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:43:48 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 582.049632][T23405] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:43:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {0x0}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 582.117453][T23405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 582.138192][T23405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3180}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0x2, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x80000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={0x14, r1, 0xc4c2c822e4e11799, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000880)={'\\C\x1b]R\x0e\x06C\xc3MY\x1d\x9b\tq\xc3\x16\xb1\x9b4hy\xeaU\x0e3\\C6im\x9bu\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x1bc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', '\x9bd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b1]\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r2, &(0x7f0000000880)={'\\C\x1b]R\x0e\x06C\xc3MY\x1d\x9b\tq\xc3\x16\xb1\x9b4hy\xeaU\x0e3\\C6im\x9bu\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x1bc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', '\x9bd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b1]\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1) 20:43:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:43:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = syz_open_procfs(0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x9}, 0x8) dup3(r2, 0xffffffffffffffff, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, 0x0, &(0x7f0000000080)) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) 20:43:56 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r0, 0x0) 20:43:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {0x0}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:43:56 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 590.000859][T23532] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:43:56 executing program 0: 20:43:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 590.060569][T23532] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 590.081601][T23532] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:43:56 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:43:56 executing program 0: 20:43:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:43:56 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, 0xffffffffffffffff, 0x0) [ 590.433146][T23653] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 590.544252][T23653] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 590.552088][T23653] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:44:01 executing program 5: 20:44:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:44:01 executing program 0: 20:44:01 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, 0xffffffffffffffff, 0x0) 20:44:01 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:44:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:44:01 executing program 0: 20:44:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 595.178754][T23773] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 595.259573][T23773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 595.284054][T23773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:44:01 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, 0xffffffffffffffff, 0x0) 20:44:01 executing program 0: 20:44:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:44:01 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) [ 595.709172][T23995] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 595.730897][T23995] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 595.744354][T23995] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:44:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) 20:44:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:44:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:44:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x3c) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000200)={r1, 0xffffffffffffffff, 0x7}, 0x10) 20:44:07 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) setsockopt$IPT_SO_SET_REPLACE(r6, 0x8000000000000, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x2, 0x3, 0x1e0, 0x90, 0x90, 0x90, 0x90, 0x90, 0x148, 0x148, 0x148, 0x148, 0x148, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6g\x03\x00\x00\x00\xc9\xa6\xc2\b`J\x8c\xff', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x240) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 20:44:07 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:44:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 601.461423][T24012] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:44:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x3c) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000200)={r1, 0xffffffffffffffff, 0x7}, 0x10) [ 601.524138][T24012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 601.531706][T24012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:44:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) geteuid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 20:44:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:44:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1da}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:44:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 601.876662][T24233] ipt_CLUSTERIP: Please specify destination IP 20:44:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) geteuid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 20:44:14 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:44:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:44:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) geteuid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 20:44:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:44:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b", 0x1}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 608.681040][T24252] ipt_CLUSTERIP: Please specify destination IP [ 608.700173][T24251] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:44:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:44:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) [ 608.733064][T24251] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 608.762785][T24251] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:44:15 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 608.882732][T24262] ipt_CLUSTERIP: Please specify destination IP 20:44:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:44:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:44:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b", 0x1}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 609.094500][T24270] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 609.104676][T24272] ipt_CLUSTERIP: Please specify destination IP [ 609.119147][T24270] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 609.138650][T24270] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:44:24 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) geteuid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 20:44:24 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:44:24 executing program 3: socket$packet(0x11, 0x0, 0x300) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) socket$inet_sctp(0x2, 0x5, 0x84) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 20:44:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:44:24 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:44:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b", 0x1}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 617.908493][T24287] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 617.919579][T24287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 617.938674][T24287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:44:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:44:24 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:44:24 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:44:24 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:44:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 618.271355][T24370] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:44:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f026854", 0xee}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 618.349738][T24370] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 618.382756][T24370] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:44:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) geteuid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000200)) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 20:44:33 executing program 3: socket$packet(0x11, 0x0, 0x300) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) socket$inet_sctp(0x2, 0x5, 0x84) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 20:44:33 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:44:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:44:33 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:44:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f026854", 0xee}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 627.219984][T24432] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 627.248471][T24432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:44:33 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:44:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 627.264510][T24432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:44:33 executing program 3: socket$packet(0x11, 0x0, 0x300) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) socket$inet_sctp(0x2, 0x5, 0x84) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 20:44:33 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:44:33 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:44:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 627.559167][T24452] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24452] 20:44:42 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) socket$inet_sctp(0x2, 0x5, 0x84) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 20:44:42 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:44:42 executing program 3: socket$packet(0x11, 0x0, 0x300) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) socket$inet_sctp(0x2, 0x5, 0x84) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 20:44:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:44:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 20:44:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f026854", 0xee}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:44:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) [ 636.606668][T24473] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24473] 20:44:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:44:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:44:43 executing program 3: 20:44:43 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, 0x0, 0x4000000000dc) 20:44:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) [ 636.973140][T24498] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24498] 20:44:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x1f8, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x258) 20:44:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x164}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:44:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:44:50 executing program 3: 20:44:50 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:44:50 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) socket$inet_sctp(0x2, 0x5, 0x84) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 20:44:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 643.921338][T24513] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24513] 20:44:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x1f8, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x258) 20:44:50 executing program 3: 20:44:50 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:44:50 executing program 3: 20:44:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 644.184794][T24529] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24529] 20:44:55 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x1, &(0x7f0000000280)='\x00'}, 0x30) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) socket$inet_sctp(0x2, 0x5, 0x84) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 20:44:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x1f8, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x258) 20:44:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:44:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x164}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:44:55 executing program 3: 20:44:55 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:44:55 executing program 3: [ 649.120671][T24545] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24545] 20:44:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:44:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0x0, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:44:55 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:44:55 executing program 3: 20:44:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 649.368784][T24560] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24560] [ 649.381503][T24559] ipt_CLUSTERIP: Please specify destination IP 20:45:04 executing program 5: 20:45:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0x0, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:45:04 executing program 3: 20:45:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:45:04 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x164}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 658.478897][T24581] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24581] [ 658.496681][T24584] ipt_CLUSTERIP: Please specify destination IP 20:45:04 executing program 3: 20:45:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:45:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0x0, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:45:04 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:04 executing program 3: [ 658.720075][T24595] ipt_CLUSTERIP: Please specify destination IP 20:45:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 658.839457][T24601] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24601] 20:45:11 executing program 5: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x220, 0xd0, 0xd0, 0x0, 0x0, 0x0, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) 20:45:11 executing program 3: 20:45:11 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xaa, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001200ff8e000000000000005e070000001800"/36], 0x2c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7fc}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 20:45:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:45:11 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x19f}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:45:11 executing program 3: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000280)='.\x00', 0x2a4) splice(r3, 0x0, r2, 0x0, 0x39, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 664.787897][T24618] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24618] [ 664.799649][T24620] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 20:45:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=@newlink={0x34, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:45:11 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 664.905871][T24625] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 20:45:11 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xaa, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001200ff8e000000000000005e070000001800"/36], 0x2c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7fc}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 665.019838][T24632] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24632] 20:45:11 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) [ 665.083678][T24694] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 20:45:11 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 665.286416][T24742] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24742] 20:45:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:45:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 20:45:19 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:45:19 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:19 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x14}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:45:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x19f}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 673.013740][T24750] ipt_CLUSTERIP: Please specify destination IP [ 673.071481][T24760] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24760] 20:45:19 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5453, 0x0) 20:45:19 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:19 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) [ 673.297345][T24874] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24874] 20:45:19 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:19 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) open(0x0, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETSW(r0, 0x5453, 0x0) 20:45:19 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) [ 673.502937][T24983] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[24983] 20:45:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="2b70696473204a09b31ad301e9b523e3db58b1ffe5b313116c82b956e19b52264fefecf9f7be880e5de20ad155baed34124c2dd35ca08bab449edbcae50aee32"], 0x6) 20:45:27 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5453, 0x0) 20:45:27 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) 20:45:27 executing program 0: shmget(0x1, 0x4000, 0x9f9932a291c8e6c, &(0x7f0000ff9000/0x4000)=nil) 20:45:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x19f}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") [ 681.431567][T25002] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25002] 20:45:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) 20:45:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x108000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="726177b9f70000000000000000000000000000000000000000000000000000000200000003000000880400000000000098000000000000009800000500000000f0030000f0030000f0030000f0030000f00300000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000010000070000000000ac1414aa00000000000000000000000076657468315f746f5f626f6e6400000065716c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001003580300000000000000000000000000000000000000005001686173686c696d697400000000000000000000000000000000000000000269705f7674693000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000fcffffff0e0000600000000000000000000000005001686173686c696d697400000001000000000000000000000000000000000276657468305f746f5f7b737200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000006e000000400000000000000009000000080000000000000000000000000000004800544545000000000000000000000000000000000000000000000000000001ac1414bb0000000000000000000000007465716c3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) 20:45:27 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) 20:45:27 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x802, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x40000, 0x0) ioctl$TIOCSETD(r1, 0x80047456, &(0x7f0000000000)=0x100000000000000) [ 681.687943][T25016] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25016] 20:45:28 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000380)=ANY=[@ANYBLOB="08000000000000000040000000000000c800000000", @ANYRES16, @ANYBLOB="0000000000000000000000000000000024000000009f9d2c6b394180430000003aadec82c4d04da114f2ccb305c5dfc4fd590bfd13c4e5a40a009496e7594b2360cef141030065f44452769ddf46705ed7e851a74f245805430961be16715e66215864cac402e373fd77e77be6e42de38b5209296f27b6b9bbb4"]) 20:45:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 20:45:33 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:33 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, 0x0) 20:45:33 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000180)=""/246) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, 0x0) fchown(0xffffffffffffffff, 0x0, 0xee01) 20:45:33 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000380)=ANY=[@ANYBLOB="08000000000000000040000000000000c800000000", @ANYRES16, @ANYBLOB="0000000000000000000000000000000024000000009f9d2c6b394180430000003aadec82c4d04da114f2ccb305c5dfc4fd590bfd13c4e5a40a009496e7594b2360cef141030065f44452769ddf46705ed7e851a74f245805430961be16715e66215864cac402e373fd77e77be6e42de38b5209296f27b6b9bbb4"]) 20:45:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1bd}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:45:34 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, 0x0) [ 687.765023][T25151] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25151] 20:45:34 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:34 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc01456b8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001340)='./cgroup.cpu\x00', 0x200002, 0x0) socket(0x10, 0x802, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) 20:45:34 executing program 0: 20:45:34 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, 0x0) [ 688.036007][T25262] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25262] 20:45:34 executing program 0: [ 688.115230][T25262] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 688.183845][T25262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 688.207662][T25262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:45:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 20:45:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, 0x0) 20:45:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1a0}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:45:43 executing program 0: 20:45:43 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:43 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc01456b8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001340)='./cgroup.cpu\x00', 0x200002, 0x0) socket(0x10, 0x802, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) 20:45:43 executing program 3: 20:45:43 executing program 0: [ 697.195140][T25289] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25289] [ 697.219855][T25289] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:45:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, 0x0) [ 697.245866][T25289] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 697.253357][T25289] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:45:43 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:43 executing program 3: 20:45:43 executing program 0: [ 697.489492][T25304] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25304] [ 697.566687][T25304] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 697.582798][T25304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 697.604496][T25304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:45:49 executing program 5: 20:45:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, 0x0) 20:45:49 executing program 3: 20:45:49 executing program 0: 20:45:49 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x0, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="1b3b8c9d31bdf48d74798d8995bc1909abb780f407cab61144d0cee4ff12e0968dcfb5e67547ac356101a178ec3dc24424fc637b016fccac1d9aa1ab6ebd65cf43729f5fe09d2386ba3bb4d84d5f365a5f08052105284325ba3cda4f79bed7cbbdf9133a1d6d28481a655846199ba0c314a8b91248a78c7e8a353482a703cb8c415da63fe43f9e8923e12461054bca3ed3ec28a5a4bec5da842baf945b475e8198841dbb506db6b841561cf048089abf7dd77a6120d2acd08bf35fd89e7530ab08198270b02e6a65defd50b898bb14a90fc020ac4c2ecba4d119bdbcd738296b514e57f9beee20dfdf326f0268548f4c96685cf50d1c3f34c79fba0abd99d33283ce6f10862191d84c18a84a1861460b9c69af0a314bf9b9adfbebd9d7baf260ca511ff1c823d9d18ed65f964c633579262e248b7402612a30cb9fe8043d0e728da3d252e68efad5d9ceb49de6f2a36897aeb2c67013719e188bdd8d3436cf67321d6e64aa1fac865aa08dbcf6f578f77e06b09a62fec01b7439c10cfb325cff62d12910d91e45480e538791b351e5a8c1fbfd592398692d29e7c301279cb199", 0x1a0}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:45:49 executing program 3: 20:45:49 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) [ 703.500297][T25325] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25325] [ 703.535684][T25325] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 703.560136][T25325] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 703.574644][T25325] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:45:49 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:45:49 executing program 0: 20:45:49 executing program 3: 20:45:50 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:45:53 executing program 5: 20:45:53 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x0, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:45:53 executing program 0: 20:45:53 executing program 3: 20:45:53 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:45:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1a0}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:45:53 executing program 3: 20:45:53 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) [ 707.668275][T25356] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25356] 20:45:54 executing program 0: [ 707.712647][T25356] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 707.739627][T25356] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 707.778444][T25356] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:45:54 executing program 3: 20:45:54 executing program 0: 20:45:54 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:46:00 executing program 5: 20:46:00 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x0, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:46:00 executing program 3: 20:46:00 executing program 0: 20:46:00 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:46:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1af}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:46:00 executing program 0: 20:46:00 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) [ 713.918920][T25392] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25392] 20:46:00 executing program 3: [ 713.984430][T25394] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 714.032943][T25394] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 714.062750][T25394] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:00 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:46:00 executing program 3: 20:46:00 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 714.396483][T25415] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25415] [ 714.455038][T25415] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 714.475414][T25415] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 714.509123][T25415] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:06 executing program 5: 20:46:06 executing program 0: 20:46:06 executing program 3: 20:46:06 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x0, &(0x7f0000001040)}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:46:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1a1}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:46:06 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) 20:46:06 executing program 3: 20:46:06 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x6, 0xa, &(0x7f0000000000), 0x1fe) 20:46:06 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x0, &(0x7f0000001040)}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) [ 720.165661][T25432] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25432] [ 720.228680][T25432] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 720.280484][T25432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 720.297489][T25432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:06 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x26) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3b2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:46:06 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x6, 0x9, &(0x7f0000000000), 0x1fe) 20:46:06 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x4000000000dc) [ 720.487389][T25453] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25453] [ 720.549013][T25453] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 720.560727][T25453] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 720.569086][T25453] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:12 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)="0d9907b98e2eca146378a69bc0", 0xd}], 0x1}, 0x0) 20:46:12 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x0, &(0x7f0000001040)}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:46:12 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x6, 0x2, &(0x7f0000000000), 0x1fe) 20:46:12 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000000), 0x1fe) 20:46:12 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, 0x0) sendfile(r5, r6, 0x0, 0x4000000000dc) 20:46:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1a1}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:46:12 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100004000632f77fbac1414fde00bb801c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 20:46:12 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:46:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0x9) [ 726.397553][T25607] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25607] [ 726.449119][T25607] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 726.517747][T25607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 726.561545][T25607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:12 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:46:13 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, 0x0) sendfile(r5, r6, 0x0, 0x4000000000dc) 20:46:13 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='memory.events\x00') perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x2, 0xa9, 0x3f, 0xff, 0x0, 0x40, 0x20, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x2144, 0x5, 0x41cf, 0x8, 0x80, 0x8, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000007a850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb9, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000fffff0000ab00638877fb08061421e9", 0x0, 0x100, 0x0, 0x1f4}, 0x28) [ 726.896231][T25799] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25799] [ 726.965695][T25799] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 727.004986][T25799] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 727.042473][T25799] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:18 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100004000632f77fbac1414fde00bb801c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 20:46:18 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:46:18 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100004000632f77fbac1414fde00bb801c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 20:46:18 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, 0x0) sendfile(r5, r6, 0x0, 0x4000000000dc) 20:46:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1a1}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:46:18 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='memory.events\x00') perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x2, 0xa9, 0x3f, 0xff, 0x0, 0x40, 0x20, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x2144, 0x5, 0x41cf, 0x8, 0x80, 0x8, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000007a850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb9, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000fffff0000ab00638877fb08061421e9", 0x0, 0x100, 0x0, 0x1f4}, 0x28) [ 732.628278][T25918] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25918] 20:46:19 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) [ 732.726579][T25919] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 732.812668][T25919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 732.820407][T25919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:19 executing program 3: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 732.879694][ T27] audit: type=1326 audit(1577565979.139:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25922 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0x0 20:46:19 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r5, 0x0, 0x4000000000dc) [ 733.034085][T25930] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[25930] [ 733.052412][T25930] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:46:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='memory.events\x00') socket$kcm(0x10, 0x0, 0x10) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0xa9, 0x3f, 0xff, 0x0, 0x40, 0x20, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x2144, 0x5, 0x41cf, 0x8, 0x0, 0x8, 0x6}, r0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='mime_typeeth0vboxnet1nodevppp1system*-cgroup!)\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000007a850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x18000000000002a0, 0xb9, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000fffff0000ab00638877fb08061421e9", 0x0, 0x100, 0x0, 0x1f4}, 0x28) 20:46:19 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x50}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 733.093072][T25930] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 733.123939][T25930] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:19 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000280)=""/245, 0x26, 0xf5, 0x8}, 0x20) [ 733.327721][T25940] BPF:[1] ENUM (anon) [ 733.331925][T25940] BPF:size=0 vlen=0 [ 733.336443][T25940] BPF: [ 733.339356][T25940] BPF:Invalid btf_info kind_flag [ 733.344649][T25940] BPF: [ 733.344649][T25940] 20:46:28 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100004000632f77fbac1414fde00bb801c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 20:46:28 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r5, 0x0, 0x4000000000dc) 20:46:28 executing program 0: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:46:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1a8}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:46:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='memory.events\x00') socket$kcm(0x10, 0x0, 0x10) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0xa9, 0x3f, 0xff, 0x0, 0x40, 0x20, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x2144, 0x5, 0x41cf, 0x8, 0x0, 0x8, 0x6}, r0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='mime_typeeth0vboxnet1nodevppp1system*-cgroup!)\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000007a850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x18000000000002a0, 0xb9, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000fffff0000ab00638877fb08061421e9", 0x0, 0x100, 0x0, 0x1f4}, 0x28) 20:46:28 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) [ 741.930216][ T27] audit: type=1326 audit(1577565988.189:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26049 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0x0 [ 741.995479][T26059] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[26059] [ 742.014429][T26059] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 742.026231][T26059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 742.034174][T26059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:28 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r5, 0x0, 0x4000000000dc) 20:46:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='memory.events\x00') socket$kcm(0x10, 0x0, 0x10) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0xa9, 0x3f, 0xff, 0x0, 0x40, 0x20, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x2144, 0x5, 0x41cf, 0x8, 0x0, 0x8, 0x6}, r0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='mime_typeeth0vboxnet1nodevppp1system*-cgroup!)\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000007a850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x18000000000002a0, 0xb9, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000fffff0000ab00638877fb08061421e9", 0x0, 0x100, 0x0, 0x1f4}, 0x28) 20:46:28 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) [ 742.234524][T26065] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[26065] [ 742.261929][T26065] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 742.280596][T26065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 742.327089][T26065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:28 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, 0xffffffffffffffff, 0x0, 0x4000000000dc) 20:46:28 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x0, 0x0) poll(&(0x7f0000000680)=[{r0}], 0x1, 0x2) 20:46:28 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) [ 742.580553][T26175] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[26175] [ 742.638618][T26175] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 742.672355][T26175] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 742.704277][T26175] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:37 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100004000632f77fbac1414fde00bb801c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 20:46:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x41, &(0x7f0000000000)=0x7f, 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e007d5) 20:46:37 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000380)=ANY=[@ANYBLOB="08000000000000000040000000000000c800000000000000", @ANYBLOB="0000000000000000000000000000000024000000009f9d2c6b394180430000003aadec82c4d04da114f2ccb305c5dfc4fd590bfd13c4e5a40a009496e7594b2360cef141030065f44452769ddf46705ed7e851a74f245805430961be16715e66215864cac402e373fd77e77be6e42de38b5209296f27b6b9bbb4b2168f46b9af4b1d1486c682507d71be7bb32f1c89307faa333048e0bb887725d2c84964a0360725adae59bb189dd94eba197c0bc3db61bcd4d2b3f376a2c8"]) 20:46:37 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, 0x0) 20:46:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1a8}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:46:37 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, 0xffffffffffffffff, 0x0, 0x4000000000dc) [ 751.305990][ T27] audit: type=1326 audit(1577565997.569:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26193 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0x0 [ 751.332854][T26198] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[26198] [ 751.354881][T26198] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 751.366032][T26198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 751.373739][T26198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:37 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, 0xffffffffffffffff, 0x0, 0x4000000000dc) 20:46:37 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000380)=ANY=[@ANYBLOB="08000000000000000040000000000000c800000000000000", @ANYBLOB="0000000000000000000000000000000024000000009f9d2c6b394180430000003aadec82c4d04da114f2ccb305c5dfc4fd590bfd13c4e5a40a009496e7594b2360cef141030065f44452769ddf46705ed7e851a74f245805430961be16715e66215864cac402e373fd77e77be6e42de38b5209296f27b6b9bbb4b2168f46b9af4b1d1486c682507d71be7bb32f1c89307faa333048e0bb887725d2c84964a0360725adae59bb189dd94eba197c0bc3db61bcd4d2b3f376a2c8"]) [ 751.501888][T26308] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[26308] [ 751.520765][T26308] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 751.532322][T26308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 751.540435][T26308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:37 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x0) [ 751.638833][T26353] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[26353] [ 751.660749][T26353] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 751.672017][T26353] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 751.679852][T26353] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x0) 20:46:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='.puacct.stat\x00', 0x275a, 0x0) [ 751.825795][T26424] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[26424] [ 751.856876][T26424] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:46:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000400)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 751.872032][T26424] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 751.882122][T26424] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000400)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 20:46:43 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, 0x0, 0x0) 20:46:43 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, 0x0) 20:46:43 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc008551a, 0x0) 20:46:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1a8}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:46:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000400)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 757.606035][T26640] ptrace attach of "/root/syz-executor.4"[8028] was attempted by "/root/syz-executor.4"[26640] [ 757.640850][T26640] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:46:43 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc0045540, &(0x7f0000000180)) [ 757.699886][T26640] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 757.727333][T26640] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:46:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, 0x0) 20:46:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 20:46:44 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x80047456, &(0x7f0000000000)) 20:46:44 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x40001d0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x65c15bf2) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r4, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r4, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 20:46:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, 0x0) 20:46:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x40001d0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x65c15bf2) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r4, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r4, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 20:46:48 executing program 3: perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x24, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', 0x0, 0x0, 0x0) 20:46:48 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, 0x0) 20:46:48 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x80047456, &(0x7f0000000000)) 20:46:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1ac}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:46:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x40001d0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x65c15bf2) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r4, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r4, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 20:46:48 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, 0x0) 20:46:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1a9}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:46:48 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, 0x0) 20:46:48 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) 20:46:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x40001d0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x65c15bf2) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r4, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r4, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 20:46:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x40001d0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x65c15bf2) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r4, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r4, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 20:46:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x40001d0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x65c15bf2) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r4, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r4, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 20:46:56 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) 20:46:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x40001d0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x65c15bf2) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r4, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r4, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 20:46:56 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x100000006, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffed3, &(0x7f0000000500)="b9ff0300600d698cb89e14f089061fffffff00004000632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x0) 20:46:56 executing program 4: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$key(0xf, 0x3, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) pselect6(0xd, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x800000000001ff}, &(0x7f0000000200), 0x0) 20:46:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1a9}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:46:56 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) 20:46:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x40001d0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x65c15bf2) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r4, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r4, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 20:46:56 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x21, 0x0, 0x26, 0x26, 0x2, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'w'}]}}, &(0x7f0000000380)=""/249, 0x42, 0xf9, 0x8}, 0x20) 20:46:56 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCSETD(r1, 0x5423, 0x0) 20:46:57 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x21, 0x0, 0x26, 0x26, 0x2, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'w'}]}}, &(0x7f0000000380)=""/249, 0x42, 0xf9, 0x8}, 0x20) [ 770.831557][T27173] BPF:Unsupported btf_header 20:46:57 executing program 3: [ 770.970601][T27279] BPF:Unsupported btf_header 20:47:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x40001d0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x65c15bf2) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r4, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r4, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 20:47:04 executing program 4: 20:47:04 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x100000006, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffed3, &(0x7f0000000500)="b9ff0300600d698cb89e14f089061fffffff00004000632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x0) 20:47:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x100000006, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffed3, &(0x7f0000000500)="b9ff0300600d698cb89e14f089061fffffff00004000632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x0) 20:47:04 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCSETD(r1, 0x5423, 0x0) 20:47:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1a9}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:47:04 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCSETD(r1, 0x5423, 0x0) 20:47:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x100000006, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a74a0091ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b0000002cab154ad029a119ca3c97278087001460"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffed3, &(0x7f0000000500)="b9ff0300600d698cb89e14f089061fffffff00004000632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x0) 20:47:04 executing program 0: 20:47:04 executing program 0: 20:47:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000004c0)="cdb160e6e276648143afe6c146546abedb9c3537c432f096e35aa0fdfbb7f3e2bd213b85a836a06c2ef6c08c98feae", 0x2f}, {&(0x7f0000000040)="71059b0b10742cd6f2c254fcfbd24c368f", 0x11}, {&(0x7f0000000200)="86714c4e243646c0a66770d41c0e1a7c918fc76864239990a054d58e8c1a", 0x1e}, {0x0}, {0x0}, {&(0x7f0000001340)="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", 0x1ab}], 0x6}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 20:47:05 executing program 0: [ 784.648314][ C1] ================================================================== [ 784.656486][ C1] BUG: KCSAN: data-race in fprop_fraction_percpu / percpu_counter_add_batch [ 784.665143][ C1] [ 784.667493][ C1] read to 0xffff8880a181fa40 of 8 bytes by task 27527 on cpu 0: [ 784.675109][ C1] fprop_fraction_percpu+0x8b/0x1c0 [ 784.680311][ C1] __wb_calc_thresh+0x6f/0x250 [ 784.685065][ C1] balance_dirty_pages+0x1187/0x1ba0 [ 784.690327][ C1] balance_dirty_pages_ratelimited+0x703/0xa30 [ 784.696462][ C1] generic_perform_write+0x22d/0x320 [ 784.701728][ C1] ext4_buffered_write_iter+0x143/0x290 [ 784.707249][ C1] ext4_file_write_iter+0xf4/0xd40 [ 784.712341][ C1] new_sync_write+0x388/0x4a0 [ 784.716999][ C1] __vfs_write+0xb1/0xc0 [ 784.721222][ C1] vfs_write+0x18a/0x390 [ 784.725442][ C1] ksys_write+0xd5/0x1b0 [ 784.729663][ C1] __x64_sys_write+0x4c/0x60 [ 784.734238][ C1] do_syscall_64+0xcc/0x3a0 [ 784.738734][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 784.744617][ C1] [ 784.746925][ C1] write to 0xffff8880a181fa40 of 8 bytes by interrupt on cpu 1: [ 784.754539][ C1] percpu_counter_add_batch+0xca/0x150 [ 784.759987][ C1] __fprop_inc_percpu_max+0x9a/0x150 [ 784.765429][ C1] test_clear_page_writeback+0x5ca/0x790 [ 784.771045][ C1] end_page_writeback+0x9e/0x190 [ 784.775965][ C1] ext4_finish_bio+0x40d/0x520 [ 784.780719][ C1] ext4_end_bio+0xd2/0x2f0 [ 784.785114][ C1] bio_endio+0x2fa/0x400 [ 784.789335][ C1] blk_update_request+0x427/0x7b0 [ 784.794349][ C1] scsi_end_request+0x6b/0x360 [ 784.799094][ C1] scsi_io_completion+0x11d/0xc80 [ 784.804097][ C1] scsi_finish_command+0x283/0x380 [ 784.809192][ C1] scsi_softirq_done+0x259/0x280 [ 784.814111][ C1] blk_done_softirq+0x1eb/0x250 [ 784.818950][ C1] __do_softirq+0x115/0x33f [ 784.823435][ C1] irq_exit+0xbb/0xe0 [ 784.827411][ C1] do_IRQ+0x81/0x130 [ 784.831526][ C1] ret_from_intr+0x0/0x21 [ 784.836069][ C1] __tsan_read8+0x6/0x100 [ 784.840403][ C1] __get_user_pages+0x3a0/0x1130 [ 784.845324][ C1] populate_vma_page_range+0xe6/0x100 [ 784.850672][ C1] __mm_populate+0x168/0x2a0 [ 784.855243][ C1] vm_mmap_pgoff+0x181/0x190 [ 784.859823][ C1] ksys_mmap_pgoff+0x2d8/0x420 [ 784.864580][ C1] __x64_sys_mmap+0x2e/0x40 [ 784.869063][ C1] do_syscall_64+0xcc/0x3a0 [ 784.873548][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 784.879419][ C1] [ 784.881733][ C1] Reported by Kernel Concurrency Sanitizer on: [ 784.887865][ C1] CPU: 1 PID: 27531 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 784.896519][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.906549][ C1] ================================================================== [ 784.914585][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 784.921159][ C1] CPU: 1 PID: 27531 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 784.929801][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.939855][ C1] Call Trace: [ 784.943160][ C1] [ 784.946022][ C1] dump_stack+0x11d/0x181 [ 784.950335][ C1] panic+0x210/0x640 [ 784.954214][ C1] ? vprintk_func+0x8d/0x140 [ 784.958789][ C1] kcsan_report.cold+0xc/0xd [ 784.963362][ C1] kcsan_setup_watchpoint+0x3fe/0x460 [ 784.968723][ C1] __tsan_unaligned_write8+0xc7/0x110 [ 784.974094][ C1] percpu_counter_add_batch+0xca/0x150 [ 784.979559][ C1] __fprop_inc_percpu_max+0x9a/0x150 [ 784.984833][ C1] test_clear_page_writeback+0x5ca/0x790 [ 784.990460][ C1] end_page_writeback+0x9e/0x190 [ 784.995385][ C1] ext4_finish_bio+0x40d/0x520 [ 785.000135][ C1] ext4_end_bio+0xd2/0x2f0 [ 785.004541][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.010760][ C1] ? bio_uninit+0x10c/0x170 [ 785.015255][ C1] ? ext4_put_io_end_defer+0x2b0/0x2b0 [ 785.020694][ C1] bio_endio+0x2fa/0x400 [ 785.024915][ C1] ? bio_advance+0x1f1/0x270 [ 785.029486][ C1] blk_update_request+0x427/0x7b0 [ 785.034528][ C1] scsi_end_request+0x6b/0x360 [ 785.039372][ C1] ? __rcu_read_unlock+0x66/0x3d0 [ 785.044523][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 785.050756][ C1] scsi_io_completion+0x11d/0xc80 [ 785.055780][ C1] scsi_finish_command+0x283/0x380 [ 785.060877][ C1] scsi_softirq_done+0x259/0x280 [ 785.065913][ C1] blk_done_softirq+0x1eb/0x250 [ 785.070769][ C1] __do_softirq+0x115/0x33f [ 785.075288][ C1] irq_exit+0xbb/0xe0 [ 785.079265][ C1] do_IRQ+0x81/0x130 [ 785.083148][ C1] common_interrupt+0xf/0xf [ 785.087636][ C1] [ 785.090558][ C1] RIP: 0010:__tsan_read8+0x6/0x100 [ 785.095756][ C1] Code: 8b 0d c6 d8 ae 7e 48 c1 e9 10 83 e1 0e 75 cc 83 ea 01 89 50 04 5d c3 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 49 89 f9 <55> 48 ba ff ff ff ff ff ff 00 00 48 c1 e8 09 49 21 d1 48 89 e5 4d [ 785.115354][ C1] RSP: 0018:ffffc90000f37c10 EFLAGS: 00000212 ORIG_RAX: ffffffffffffffdd [ 785.123766][ C1] RAX: ffff888121626000 RBX: ffffc90000f37d08 RCX: ffffc9001372b000 [ 785.131743][ C1] RDX: 000000000000af58 RSI: ffffffff815e584f RDI: ffff888121626000 [ 785.139706][ C1] RBP: ffffc90000f37c80 R08: ffff888121a8e080 R09: ffff888121626000 [ 785.147712][ C1] R10: 0000c90000f37d10 R11: 0000ffff85c56557 R12: 0000000000000000 [ 785.155674][ C1] R13: ffff888120eed7d0 R14: ffff888121626000 R15: ffff888120eed810 [ 785.163647][ C1] ? follow_page_mask+0x2df/0x1100 [ 785.168852][ C1] ? follow_page_mask+0x2e7/0x1100 [ 785.173976][ C1] __get_user_pages+0x3a0/0x1130 [ 785.178907][ C1] populate_vma_page_range+0xe6/0x100 [ 785.184270][ C1] __mm_populate+0x168/0x2a0 [ 785.188841][ C1] vm_mmap_pgoff+0x181/0x190 [ 785.193420][ C1] ksys_mmap_pgoff+0x2d8/0x420 [ 785.198178][ C1] ? debug_smp_processor_id+0x43/0x137 [ 785.203615][ C1] __x64_sys_mmap+0x2e/0x40 [ 785.208099][ C1] do_syscall_64+0xcc/0x3a0 [ 785.212600][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 785.218470][ C1] RIP: 0033:0x45a919 [ 785.222436][ C1] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 785.242121][ C1] RSP: 002b:00007f27ef5aac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 785.250511][ C1] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045a919 [ 785.258473][ C1] RDX: 000000000300000a RSI: 0000000000600000 RDI: 0000000020a00000 [ 785.266435][ C1] RBP: 000000000075c070 R08: 0000000000000006 R09: 0000000000000000 [ 785.274398][ C1] R10: 0000000000002011 R11: 0000000000000246 R12: 00007f27ef5ab6d4 [ 785.282359][ C1] R13: 00000000004c7b7b R14: 00000000004dea80 R15: 00000000ffffffff [ 786.401022][ C1] Shutting down cpus with NMI [ 786.407091][ C1] Kernel Offset: disabled [ 786.411436][ C1] Rebooting in 86400 seconds..