[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.33' (ECDSA) to the list of known hosts. 2020/04/21 09:40:49 fuzzer started 2020/04/21 09:40:51 dialing manager at 10.128.0.105:39923 2020/04/21 09:40:51 syscalls: 2960 2020/04/21 09:40:51 code coverage: enabled 2020/04/21 09:40:51 comparison tracing: enabled 2020/04/21 09:40:51 extra coverage: enabled 2020/04/21 09:40:51 setuid sandbox: enabled 2020/04/21 09:40:51 namespace sandbox: enabled 2020/04/21 09:40:51 Android sandbox: /sys/fs/selinux/policy does not exist 2020/04/21 09:40:51 fault injection: enabled 2020/04/21 09:40:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/04/21 09:40:51 net packet injection: enabled 2020/04/21 09:40:51 net device setup: enabled 2020/04/21 09:40:51 concurrency sanitizer: enabled 2020/04/21 09:40:51 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/04/21 09:40:51 USB emulation: /dev/raw-gadget does not exist syzkaller login: [ 48.786993][ T6730] KCSAN: could not find function: '_find_next_bit' [ 50.443316][ T6730] KCSAN: could not find function: 'poll_schedule_timeout' 2020/04/21 09:40:56 adding functions to KCSAN blacklist: '__add_to_page_cache_locked' 'vm_area_dup' 'generic_fillattr' 'xas_find_marked' 'pcpu_alloc' 'do_nanosleep' 'ep_poll' 'copy_process' 'blk_mq_sched_dispatch_requests' 'do_signal_stop' 'ext4_mark_iloc_dirty' 'pipe_double_lock' 'io_sq_thread' 'echo_char' 'generic_write_end' '_find_next_bit' '__snd_rawmidi_transmit_ack' 'ktime_get_ts64' 'tick_nohz_next_event' 'audit_log_start' 'mod_timer' 'n_tty_receive_buf_common' 'kcm_rfree' 'tick_sched_do_timer' 'find_get_pages_range_tag' 'run_timer_softirq' 'poll_schedule_timeout' 'blk_mq_dispatch_rq_list' 'tick_nohz_idle_stop_tick' '__ext4_new_inode' 'page_counter_charge' 'kauditd_thread' 'fsnotify_detach_connector_from_object' 'do_exit' 'wbt_done' 'futex_wait_queue_me' 'snd_seq_check_queue' 'ktime_get_real_seconds' 'xas_clear_mark' 'blk_mq_get_request' 'add_timer' 'ext4_free_inodes_count' 09:44:13 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0xb, 0x6, [@typedef={0x0, 0x0, 0x0, 0x7}, @int={0x0, 0x0, 0x0, 0x1, 0x5}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) [ 249.080238][ T6734] IPVS: ftp: loaded support on port[0] = 21 [ 249.152780][ T6734] chnl_net:caif_netlink_parms(): no params data found 09:44:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYPTR, @ANYBLOB="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", @ANYPTR64], 0x0, 0x163}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/6, 0x6}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 249.254186][ T6734] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.261487][ T6734] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.270194][ T6734] device bridge_slave_0 entered promiscuous mode [ 249.278553][ T6734] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.285645][ T6734] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.294649][ T6734] device bridge_slave_1 entered promiscuous mode [ 249.315600][ T6734] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 249.326734][ T6734] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 249.349943][ T6734] team0: Port device team_slave_0 added [ 249.367564][ T6734] team0: Port device team_slave_1 added [ 249.406885][ T6734] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 249.413971][ T6734] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.441019][ T6734] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 249.453804][ T6734] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 249.457424][ T6875] IPVS: ftp: loaded support on port[0] = 21 [ 249.462043][ T6734] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.493940][ T6734] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 09:44:14 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/213, 0xd5) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/214, 0xd6}, {&(0x7f00000004c0)=""/79, 0x4f}, {&(0x7f0000000540)=""/255, 0xff}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000001c0)=""/11, 0xb}], 0x6, 0x2) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) socket$inet_icmp(0x2, 0x2, 0x1) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000240)='/dev/input/mice\x00', 0x0) [ 249.559505][ T6734] device hsr_slave_0 entered promiscuous mode [ 249.657563][ T6734] device hsr_slave_1 entered promiscuous mode 09:44:14 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) [ 249.786702][ T6906] IPVS: ftp: loaded support on port[0] = 21 [ 249.856636][ T6875] chnl_net:caif_netlink_parms(): no params data found [ 250.015447][ T6734] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 250.062861][ T6906] chnl_net:caif_netlink_parms(): no params data found [ 250.072963][ T6734] netdevsim netdevsim0 netdevsim1: renamed from eth1 09:44:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ipv6_route\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ssse3\x00'}, 0x58) r4 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x4ffc) [ 250.122920][ T6734] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 250.207798][ T7153] IPVS: ftp: loaded support on port[0] = 21 [ 250.219032][ T6734] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 250.277757][ T6875] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.285941][ T6875] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.300122][ T6875] device bridge_slave_0 entered promiscuous mode [ 250.336639][ T7171] IPVS: ftp: loaded support on port[0] = 21 [ 250.342912][ T6875] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.350737][ T6875] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.359735][ T6875] device bridge_slave_1 entered promiscuous mode [ 250.430713][ T6875] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 09:44:14 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$llc(r0, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) [ 250.479148][ T6875] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 250.490844][ T6906] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.500451][ T6906] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.509863][ T6906] device bridge_slave_0 entered promiscuous mode [ 250.521397][ T6734] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.539202][ T6906] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.546300][ T6906] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.557112][ T6906] device bridge_slave_1 entered promiscuous mode [ 250.588617][ T6875] team0: Port device team_slave_0 added [ 250.596010][ T6875] team0: Port device team_slave_1 added [ 250.619817][ T7153] chnl_net:caif_netlink_parms(): no params data found [ 250.650471][ T7171] chnl_net:caif_netlink_parms(): no params data found [ 250.660440][ T6906] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 250.688893][ T6906] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 250.705410][ T6875] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 250.713344][ T6875] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.739922][ T6875] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 250.752323][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.761073][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.782446][ T6875] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 250.790547][ T6875] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.817956][ T6875] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 250.842304][ T6734] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.853634][ T7417] IPVS: ftp: loaded support on port[0] = 21 [ 250.860366][ T6906] team0: Port device team_slave_0 added [ 250.879269][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.890286][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.898909][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.905940][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.914280][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.923189][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.932447][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.939523][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.947685][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.957697][ T6906] team0: Port device team_slave_1 added [ 251.018602][ T6875] device hsr_slave_0 entered promiscuous mode [ 251.077038][ T6875] device hsr_slave_1 entered promiscuous mode [ 251.116696][ T6875] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 251.124287][ T6875] Cannot create hsr debugfs directory [ 251.143594][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.153153][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.167958][ T6906] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 251.174918][ T6906] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.201803][ T6906] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 251.223311][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.232052][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.263005][ T6906] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 251.270011][ T6906] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.298699][ T6906] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 251.317945][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.326251][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.335264][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.344308][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.352871][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.361581][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.370216][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.378812][ T7171] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.385898][ T7171] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.393929][ T7171] device bridge_slave_0 entered promiscuous mode [ 251.400997][ T7153] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.408517][ T7153] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.416158][ T7153] device bridge_slave_0 entered promiscuous mode [ 251.478690][ T6906] device hsr_slave_0 entered promiscuous mode [ 251.537255][ T6906] device hsr_slave_1 entered promiscuous mode [ 251.586732][ T6906] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 251.594313][ T6906] Cannot create hsr debugfs directory [ 251.600539][ T7171] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.608133][ T7171] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.615857][ T7171] device bridge_slave_1 entered promiscuous mode [ 251.628453][ T7153] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.635505][ T7153] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.643895][ T7153] device bridge_slave_1 entered promiscuous mode [ 251.652184][ T6734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.706007][ T7171] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 251.731208][ T7171] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 251.748548][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.756047][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.765372][ T7153] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 251.782260][ T6734] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 251.803819][ T7153] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 251.845613][ T7417] chnl_net:caif_netlink_parms(): no params data found [ 251.859877][ T7171] team0: Port device team_slave_0 added [ 251.870967][ T7171] team0: Port device team_slave_1 added [ 251.905742][ T7153] team0: Port device team_slave_0 added [ 251.912163][ T7171] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 251.921314][ T7171] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.947420][ T7171] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 251.961240][ T7171] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 251.968863][ T7171] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.995954][ T7171] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 252.027758][ T7153] team0: Port device team_slave_1 added [ 252.039117][ T6875] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 252.108660][ T7171] device hsr_slave_0 entered promiscuous mode [ 252.146980][ T7171] device hsr_slave_1 entered promiscuous mode [ 252.186856][ T7171] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 252.194430][ T7171] Cannot create hsr debugfs directory [ 252.213102][ T6875] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 252.270544][ T6875] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 252.320985][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 252.329803][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 252.349736][ T7153] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 252.357946][ T7153] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 252.384819][ T7153] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 252.397254][ T6875] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 252.451130][ T6906] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 252.511824][ T7153] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 252.518941][ T7153] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 252.545253][ T7153] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 252.580983][ T6906] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 252.620236][ T6906] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 252.675920][ T7417] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.684812][ T7417] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.693683][ T7417] device bridge_slave_0 entered promiscuous mode [ 252.702162][ T7417] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.709480][ T7417] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.717912][ T7417] device bridge_slave_1 entered promiscuous mode [ 252.729100][ T6734] device veth0_vlan entered promiscuous mode [ 252.739160][ T6906] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 252.810392][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.821486][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.830678][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.838842][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.850682][ T6734] device veth1_vlan entered promiscuous mode [ 252.866975][ T7417] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 252.918644][ T7153] device hsr_slave_0 entered promiscuous mode [ 252.976817][ T7153] device hsr_slave_1 entered promiscuous mode [ 253.016766][ T7153] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 253.024337][ T7153] Cannot create hsr debugfs directory [ 253.037805][ T7417] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.105615][ T7417] team0: Port device team_slave_0 added [ 253.121119][ T7171] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 253.168632][ T7171] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 253.219086][ T7171] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 253.254136][ T7417] team0: Port device team_slave_1 added [ 253.272717][ T7171] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 253.324295][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 253.334237][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 253.344730][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.353595][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.371796][ T6734] device veth0_macvtap entered promiscuous mode [ 253.379667][ T7417] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 253.388919][ T7417] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.415332][ T7417] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 253.429481][ T7417] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 253.436561][ T7417] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.463059][ T7417] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 253.500911][ T6734] device veth1_macvtap entered promiscuous mode [ 253.530313][ T7153] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 253.570247][ T7153] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 253.629636][ T7153] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 253.708743][ T7153] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 253.788285][ T7417] device hsr_slave_0 entered promiscuous mode [ 253.826951][ T7417] device hsr_slave_1 entered promiscuous mode [ 253.876483][ T7417] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 253.884057][ T7417] Cannot create hsr debugfs directory [ 253.902653][ T6875] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.916100][ T6734] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 253.944888][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 253.953790][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.964838][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.977104][ T6734] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 253.994622][ T6906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.015079][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.023859][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.035341][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.043352][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.058531][ T6875] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.084355][ T6906] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.100159][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.108697][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.158020][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.170399][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.179128][ T7802] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.186314][ T7802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.194801][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.203578][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.212266][ T7802] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.219358][ T7802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.227463][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.235930][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.244311][ T7802] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.251422][ T7802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.282484][ T7417] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 254.329320][ T7417] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 254.378465][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.387141][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.395110][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.404269][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.413169][ T7802] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.420237][ T7802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.428434][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 254.437557][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 254.446569][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.455357][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.463999][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.473749][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.482098][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.496353][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.505395][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.514651][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.523067][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.536307][ T7417] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 254.591339][ T7171] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.610358][ T7153] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.617699][ T7417] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 254.667098][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.675437][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.684370][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.693238][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.702419][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.711194][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.719998][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.729015][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.737955][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.747980][ T6875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.778579][ T7153] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.796814][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.804713][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.813066][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.821784][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.829840][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.837587][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.851076][ T7171] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.861709][ T6875] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.877349][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.889798][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.898300][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.907788][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.915950][ T3638] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.923135][ T3638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.931189][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.940021][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.948510][ T3638] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.955668][ T3638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.966328][ T6906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.997924][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.005892][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.015823][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.024985][ T2959] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.032096][ T2959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.040484][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 255.049745][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.058606][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.067312][ T2959] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.074347][ T2959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.082836][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 255.091834][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 255.100545][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 255.109508][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.118320][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.127157][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.135173][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 255.175629][ T7153] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 255.186020][ T7153] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 255.215290][ T7980] BPF:Section overlap found 09:44:19 executing program 0: [ 255.221718][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.247162][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.262019][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.279243][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 09:44:19 executing program 0: clone(0x13122001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="500000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="65350600000000001c0012800b0001006970766c616e00000c00028006000100020000000a000500040000000000000008000a0088ec3ca406b9ca991df216f39bdab65a8de98cbf369f17b15ee962a922edfcee9c828590213f84517bfd68130bc8926579134dc5cd53d3f5b694c65fb43a3fe5775cb3ce7f8a73dcf6407c4897973c276537f42e9bfe6344b40d6849768712956d5d640ca469cbec0151da660fc103b835dbcb66da4fddaef16140a1979269f642c7db1f61018c73addfe4e845679dc2024011d26eb5f16b8c000000", @ANYRES32=0x0, @ANYBLOB="398fc0068b27d1364ef7abc8"], 0x50}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 255.300103][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.317348][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.336945][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.356250][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.365067][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 255.376864][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.385753][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 255.394973][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.404462][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 255.413765][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 255.442116][ T7171] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 255.454303][ T7171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 255.481434][ T6906] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 255.492096][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 255.503581][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 255.511566][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 255.520011][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.528745][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 255.537603][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 255.545803][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 255.554011][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.562136][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.570484][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.578548][ T7991] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 255.591440][ T7991] device ipvlan2 entered promiscuous mode [ 255.649606][ T6875] device veth0_vlan entered promiscuous mode [ 255.677025][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 255.684534][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.702747][ T7153] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 255.719464][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 255.729504][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.737525][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.746798][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.757511][ T6875] device veth1_vlan entered promiscuous mode [ 255.766876][ T7417] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.786347][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 255.795095][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.804725][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.812870][ T3946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.825564][ T7171] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 255.836722][ T6906] device veth0_vlan entered promiscuous mode [ 255.844573][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.853416][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.861654][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.870724][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.883197][ T7417] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.904437][ T6906] device veth1_vlan entered promiscuous mode [ 255.921877][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 255.937771][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.946807][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.955120][ T2959] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.962222][ T2959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.975427][ T7153] device veth0_vlan entered promiscuous mode [ 255.993041][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 09:44:20 executing program 0: gettid() unshare(0x8000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)) chmod(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x202201, 0x0) mq_open(&(0x7f0000000040)='.n\x00x\x00\xfe\x00\x00\x00', 0x6e93ebbbcc0884f2, 0x1, 0x0) [ 256.009667][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.018857][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 256.036457][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.074836][ T6875] device veth0_macvtap entered promiscuous mode [ 256.095991][ T6875] device veth1_macvtap entered promiscuous mode [ 256.104077][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.122597][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.133793][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.143393][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.154493][ T3638] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.161656][ T3638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.169895][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.179367][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.188531][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.197162][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.205721][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 256.214692][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 09:44:20 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) shutdown(r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) [ 256.223601][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 256.233991][ T7153] device veth1_vlan entered promiscuous mode [ 256.266191][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 256.274393][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 256.288993][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 256.298446][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.308965][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.318191][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 256.327791][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.354609][ T7417] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 09:44:20 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) shutdown(r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) [ 256.370598][ T7417] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 256.390530][ T6906] device veth0_macvtap entered promiscuous mode [ 256.411731][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 256.426601][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 256.435169][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 256.450286][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.459192][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 09:44:20 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) shutdown(r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) [ 256.468472][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.478730][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.496436][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 256.510883][ T6875] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.522829][ T6875] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.557387][ T6875] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 256.585522][ T6906] device veth1_macvtap entered promiscuous mode [ 256.605471][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 256.627490][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 09:44:21 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) shutdown(r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) [ 256.636777][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 256.645320][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 256.657193][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 256.664735][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.673080][ T7171] device veth0_vlan entered promiscuous mode [ 256.694740][ T7417] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 256.716816][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.725497][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.751228][ T7153] device veth0_macvtap entered promiscuous mode [ 256.771057][ T6875] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.786074][ T6875] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.797604][ T6875] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 256.811606][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 256.826597][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.835249][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 256.856625][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 256.868368][ T7153] device veth1_macvtap entered promiscuous mode [ 256.882258][ T7171] device veth1_vlan entered promiscuous mode [ 256.908811][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.922038][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.933817][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.945100][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.957215][ T6906] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 256.973888][ T7153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.987140][ T7153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.998305][ T7153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.012510][ T7153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.023382][ T7153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.035152][ T7153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.048972][ T7153] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 257.056822][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 257.064858][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 257.073429][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 257.083329][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.091902][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.100910][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.109753][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.118805][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.142224][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.153176][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.164797][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.176006][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.187559][ T6906] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 257.203792][ T7153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.215221][ T7153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.225691][ T7153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.237192][ T7153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.247607][ T7153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.258535][ T7153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.269691][ T7153] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 257.285525][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.295420][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 257.304279][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.313199][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 257.322216][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 257.331295][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.350746][ T7171] device veth0_macvtap entered promiscuous mode [ 257.364903][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.374237][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.404865][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 257.415681][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 257.424446][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.433454][ T7417] device veth0_vlan entered promiscuous mode [ 257.446797][ T7171] device veth1_macvtap entered promiscuous mode [ 257.455253][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.469546][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.477900][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.498935][ T7417] device veth1_vlan entered promiscuous mode [ 257.508247][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 257.545424][ T7171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.558687][ T7171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.570377][ T7171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.581241][ T7171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.591216][ T7171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.602003][ T7171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.611966][ T7171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.622460][ T7171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.634058][ T7171] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 257.646650][ T7171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.659947][ T7171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.670339][ T7171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.682320][ T7171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.692535][ T7171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.703075][ T7171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.713057][ T7171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.723604][ T7171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.735165][ T7171] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 257.745643][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.755311][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.764472][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.773506][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 257.806346][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.814917][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.833183][ T7417] device veth0_macvtap entered promiscuous mode [ 257.849042][ T7417] device veth1_macvtap entered promiscuous mode [ 257.892999][ T7417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.905014][ T7417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.915205][ T7417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.925776][ T7417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.935691][ T7417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.946397][ T7417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.956581][ T7417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.967236][ T7417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.977118][ T7417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.987567][ T7417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.999008][ T7417] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 258.011205][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 258.019602][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 258.041191][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 258.058910][ T3638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 258.070281][ T7417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 258.081183][ T7417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.097300][ T7417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 258.114190][ T7417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.125159][ T7417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 258.139098][ T7417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.149018][ T7417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 258.159489][ T7417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.169552][ T7417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 258.180016][ T7417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.190993][ T7417] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 258.211715][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 258.233038][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 258.383343][ T8115] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 258.404604][ T8115] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 258.495774][ C0] hrtimer: interrupt took 27956 ns [ 258.536892][ T8115] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 258.548825][ T8115] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 258.714245][ T8146] llc_conn_state_process: llc_conn_service failed [ 258.723211][ T8147] llc_conn_state_process: llc_conn_service failed 09:44:25 executing program 1: 09:44:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:25 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) 09:44:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ipv6_route\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ssse3\x00'}, 0x58) r4 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x4ffc) 09:44:25 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/213, 0xd5) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/214, 0xd6}, {&(0x7f00000004c0)=""/79, 0x4f}, {&(0x7f0000000540)=""/255, 0xff}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000001c0)=""/11, 0xb}], 0x6, 0x2) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) socket$inet_icmp(0x2, 0x2, 0x1) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000240)='/dev/input/mice\x00', 0x0) 09:44:25 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/213, 0xd5) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/214, 0xd6}, {&(0x7f00000004c0)=""/79, 0x4f}, {&(0x7f0000000540)=""/255, 0xff}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000001c0)=""/11, 0xb}], 0x6, 0x2) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) socket$inet_icmp(0x2, 0x2, 0x1) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000240)='/dev/input/mice\x00', 0x0) 09:44:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:25 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) 09:44:25 executing program 1: [ 261.354303][ T8159] program syz-executor.5 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 261.374238][ T8159] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 09:44:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:25 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) 09:44:25 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() getdents(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/213, 0xd5) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/214, 0xd6}, {&(0x7f00000004c0)=""/79, 0x4f}, {&(0x7f0000000540)=""/255, 0xff}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f00000001c0)=""/11, 0xb}], 0x6, 0x2) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) socket$inet_icmp(0x2, 0x2, 0x1) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000240)='/dev/input/mice\x00', 0x0) 09:44:26 executing program 1: 09:44:26 executing program 5: sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) r0 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) 09:44:26 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) [ 261.605026][ T8176] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 261.648881][ T8176] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 09:44:26 executing program 4: syz_emit_ethernet(0x6f, &(0x7f0000000100)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"c3fea5ef9a039807ff176d509acda033d6bbd18b5c7e9613259563f74eda6ffe7caf1c45dd2ba8667a3664b1dd37d62689122afa0bb9567301"}}}}}}, 0x0) 09:44:26 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) 09:44:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:44:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:44:26 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:26 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 261.956219][ T8193] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:44:26 executing program 4: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x68, 0x13, 0x300, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x6d, 0xc0, 0x81, {0x4e20, 0x4e22, [0x0, 0x1, 0x7, 0x9], [0x9, 0x10001, 0x2ce, 0x8], 0x0, [0x2, 0x9]}, 0x7, 0x9}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x16, 0x1, "3c29b666914f90dc936ad3562bb2e7a2b4a7"}]}, 0x68}, 0x1, 0x0, 0x0, 0x4001}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) msgsnd(0x0, &(0x7f0000000340)={0x3}, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x291}) 09:44:26 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) 09:44:26 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x21f, 0x0) [ 262.012911][ T8193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.047455][ T8193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:44:26 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) 09:44:26 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000180)={@broadcast, @remote, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "e6221a", 0x18, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 09:44:26 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) socket$inet(0x2, 0x3, 0x33) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) splice(r0, 0x0, r2, 0x0, 0x194e1, 0x0) 09:44:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3d0, 0x0, 0x0, 0x0, 0x98, 0x140, 0x338, 0x338, 0x338, 0x338, 0x338, 0x6, 0x0, {[{{@ip={@multicast2, @rand_addr, 0x0, 0x0, 'netdevsim0\x00', 'macvtap0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@ip={@local, @loopback, 0x0, 0x0, 'veth1\x00'}, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{}, {0x0, 0xfe}}}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'veth1_to_bond\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'veth0_to_hsr\x00', 'tunl0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x430) 09:44:26 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x21f, 0x0) [ 262.327823][ T8222] x_tables: duplicate underflow at hook 1 09:44:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:44:29 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) 09:44:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000700)=@delpolicy={0x5c, 0x14, 0x97de253bf0064bf9, 0x0, 0x0, {{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, [@policy_type={0xa}]}, 0x5c}}, 0x0) 09:44:29 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000840)=ANY=[@ANYBLOB="4c0000001800030b00000000000000000a00000000000007000080000c00090008000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x4c}}, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 09:44:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x21f, 0x0) 09:44:29 executing program 4: r0 = eventfd2(0x0, 0x0) io_setup(0x9, &(0x7f0000000340)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_getevents(r1, 0x2, 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000000080)={0x77359400}) read(r0, &(0x7f00000001c0)=""/75, 0x4b) r4 = socket(0x10, 0x80002, 0x0) io_submit(r1, 0x2, &(0x7f0000000ac0)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x1, r0}, 0x0]) 09:44:29 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) 09:44:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 09:44:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x21f, 0x0) 09:44:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x21f, 0x0) 09:44:29 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) 09:44:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 09:44:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:44:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000780)=@filter={'filter\x00', 0xe, 0x4, 0x2a8, 0x98, 0x98, 0x0, 0x0, 0x98, 0x210, 0x210, 0x210, 0x210, 0x210, 0x4, 0x0, {[{{@ip={@empty, @remote, 0x0, 0x0, 'bond_slave_1\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@unspec=@helper={{0x48, 'helper\x00'}, {0x0, 'H.245\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x308) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@filter={'filter\x00', 0xe, 0x4, 0x2a8, 0x98, 0x98, 0x0, 0x0, 0x98, 0x210, 0x210, 0x210, 0x210, 0x210, 0x4, 0x0, {[{{@ip={@empty, @remote, 0x0, 0x0, 'bond_slave_1\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@unspec=@helper={{0x48, 'helper\x00'}, {0x0, 'H.245\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x308) 09:44:32 executing program 0: pipe(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x21f, 0x0) 09:44:32 executing program 3: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) 09:44:32 executing program 5: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2, 0x1100082) r0 = memfd_create(&(0x7f0000000080)='t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x3) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') preadv(r3, &(0x7f0000002380)=[{&(0x7f00000023c0)=""/4099, 0x1003}], 0x1, 0x0) 09:44:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) [ 268.044270][ T8281] x_tables: duplicate underflow at hook 2 [ 268.070639][ T8281] x_tables: duplicate underflow at hook 2 [ 268.089136][ T8281] x_tables: duplicate underflow at hook 2 09:44:32 executing program 0: pipe(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x21f, 0x0) 09:44:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0x492492492492805, 0x0) 09:44:32 executing program 3: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) 09:44:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x42082, 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) pipe(0x0) 09:44:32 executing program 4: r0 = openat$rtc(0xffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000100)) ioctl$RTC_WKALM_SET(r0, 0x7001, 0x0) syz_genetlink_get_family_id$nl80211(0x0) r2 = socket(0x10, 0x803, 0x0) accept$inet(r2, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 09:44:32 executing program 3: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f00000002c0)="e3", 0x1}], 0x1) 09:44:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:44:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:44:35 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, 0x0, 0x0) 09:44:35 executing program 0: pipe(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x21f, 0x0) 09:44:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000005200190f00003fffffffda060200000000e80001040000040d000a00ea1100000005000000", 0x43}], 0x1) 09:44:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x42082, 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) pipe(0x0) 09:44:35 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x1a7) io_submit(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x803, 0xa0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg$inet(r4, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1b1, 0x0) socket$inet(0x2, 0x1, 0x9) accept$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'veth1_vlan\x00'}, 0x18) 09:44:35 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, 0x0, 0x0) 09:44:35 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000000380)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f00000000c0)="82e8020000000000000039ee7cbf63f81f8efca487fe67b594d2a2366e2fadd8d9", 0x21}], 0x0, 0x0) 09:44:35 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:44:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x4}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 09:44:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$cont(0x20, r3, 0x0, 0x0) 09:44:38 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, 0x0, 0x0) 09:44:38 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:44:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5b0707310033000000000000000000000000000000000040"], 0x19) 09:44:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x40fdf) 09:44:38 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540), 0x0) 09:44:38 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:38 executing program 5: gettid() creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20, @empty}, 0x80) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000200)='X', 0x1, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) 09:44:38 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540), 0x0) 09:44:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) 09:44:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) socket$inet(0x2, 0x803, 0xa0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg$inet(r4, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1b1, 0x0) socket$inet(0x2, 0x0, 0x9) accept$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'veth1_vlan\x00'}, 0x18) 09:44:41 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540), 0x0) 09:44:41 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(0xffffffffffffffff) syslog(0x2, &(0x7f00000002c0)=""/92, 0x5c) 09:44:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) 09:44:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$cont(0x20, r3, 0x0, 0x0) 09:44:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) socket$inet(0x2, 0x803, 0xa0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg$inet(r4, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000000000000ffefff4960ebef2c478a8eecec9c4c7c70e96d508f07fe3b04dc8cb2acd37913b1f73ab70d6dc45954a82057877482e0000002fec513d12adb64fe868b17ee10d2088eca6dd603892ae97f2c182307050491e76079b7e99a6e319aad462f9691ba629a777fb5d0a0583b7ec4e36f08d215c2de6770338786a729beffff9ec39b4bc291b928ef9f1b12e68f74ab829bfab487daa1fc1184bf0d92f72e5660b42e5eafe40debd93f010000002ce87ccd81b56a7ae49a9d9c05298ef7f9267d128ce11df000d9fa45e8a8dcbd98d41df16b4ebd66464d1e7f66e11a5463afc56cd9c3ffa277233a378e5cb5f9d18aa6a0eee8e60f2627681241231afcffab6b767130120b75215596d1bc4fb6849874fabbd14fdf723522e65fa0c1c1598d101b737b6dd68457b0b8a034dd0c734ce4e7aab97628569897d8048e6838614b32e2eb83b4cd080277abb4862824672d7ef659a3c2b217d76be42e595d751d8dde26cecba021e627df1e13015900953b245c3db57fd510dffc9516e6456c9560e298785fe0f90e01c5c5722ea99cfcd862f8000077dd6cb84a3e0b24204ee593370bf6b862765e1c604f179187f6113b17a1a679fea2c9a8f3ec78f787549f590ea020fcdc91fc1b4dc2394b3dc3bfe86452f044183729dd5f4baa63f744982ebd6d1a0036e8231e1e5b2d63d4530be7d4a1733342ce4eadeafa2a6ca643ed1be45c869a8b4b69098fd7ad188d8b50b16b282db29052c8463c09d239ee2aa3a97a170f7f3afa435df3b9b5d1fc555b10d9084828cc8fe30df2a670deb8fd340e2457d695edd40e19081bdc22a336214579f7260edc2f30512ca006d35caa363d019f27a3130de1fbcebb81ce2b691d9bc366e42e2966f3e5ddcbb5c479359c41851c87809a394aeda0ee52bdf94c6655af8e086ba7e09ac19c6f76291574b658f50d6170a4438f300082650ea61ab211c7a031b223fd185aae12a66be1f4a1c0ec783776766f06434bfebda1a1dadf32ec9418e0818205612b432dfe033a2f6a6cbe6e445f93a975936811c256582c0a347e48635e4685e902a71d97aa840b1c60e6bab15ec183cedf224e62b58681a4b16deb4eb65d159f23206e680ab966fdeca03e5162188a92eb95c7d5715b3ad7f2767e10247c09b67f9278d23a6e6620070000000000008a3ac72019ce3df70b816dede1e8bc1d6c4d4aa54fa7281eff0f2f9ee5993ae25050ed963d60a75883c96c5c6c5792a1147eeaa1b3e5ceaa7f5abd87530ef1177e00db9012242635c2715147cd3a7d3d00fc0cd8ba9dceb772a5295097f828060c785991b69331188c93302e0711ed70135fad8938d322ed0b6584225ee157f1ef9fc6febf8082740c6f7a2462999b99d9034176ef7b5dd3e97ae6f137230f1579f0a2beaf599299b9eeba88405f93ca023655f86d367351e7cc0cd00d5993e09f86704f4210d682"], 0x18}}], 0x1b1, 0x0) socket$inet(0x2, 0x0, 0x9) accept$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'veth1_vlan\x00'}, 0x18) 09:44:41 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:41 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{0x0}], 0x1) 09:44:41 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) socket$inet(0x2, 0x803, 0xa0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg$inet(r4, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1b1, 0x0) socket$inet(0x2, 0x0, 0x9) accept$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'veth1_vlan\x00'}, 0x18) 09:44:42 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:42 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{0x0}], 0x1) 09:44:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) 09:44:42 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{0x0}], 0x1) 09:44:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 09:44:42 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$cont(0x20, r3, 0x0, 0x0) 09:44:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) socket$inet(0x2, 0x803, 0xa0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg$inet(r4, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1b1, 0x0) socket$inet(0x2, 0x0, 0x9) accept$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'veth1_vlan\x00'}, 0x18) 09:44:44 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f00000002c0)}], 0x1) 09:44:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:44:44 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:44 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000080)={@multicast, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 09:44:44 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:44:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000000c0)="207ef39c5f3eb0bda7a300babe2bfe12b33cda3cc3ff5c560ec27c70f6703395095409094409842daaeebb502e93dfd323e5f2261543e81f2b3bd49a662db4d7224bf2e3460f83db56199fc524f63811b57782498db10c3a494a7f4c8474ede3d1a0c09bd2e1a614d783c46678dc4b15ddb2e70822d979328c5352021a2b8b55b49f44e6d4455e90757eaf79b430d125027a6eb3f3e9cd426e67ee5d27d543ca3e20338afe0a52d6f7ac5a5aff58ac68bd7e7acbe7afba408045f7ffa0d913af898284b0c3"}, 0x40) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:44:45 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f00000002c0)}], 0x1) 09:44:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4, 0x0, &(0x7f00000000c0)="207ef39c5f3eb0bda7a300babe2bfe12b33cda3cc3ff5c560ec27c70f6703395095409094409842daaeebb502e93dfd323e5f2261543e81f2b3bd49a662db4d7224bf2e3460f83db56199fc524f63811b57782498db10c3a494a7f4c8474ede3d1a0c09bd2e1a614d783c46678dc4b15ddb2e70822d979328c5352021a2b8b55b49f44e6d4455e90757eaf79b430d125027a6eb3f3e9cd426e67ee5d27d543ca3e20338afe0a52d6f7ac5a5aff58ac68bd7e7acbe7afba408045f7ffa0d913af898284b0"}, 0x40) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:44:45 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:44:47 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfffffff9, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x20000200009e5c, 0x400000000000087f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 09:44:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:44:47 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f00000002c0)}], 0x1) 09:44:47 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x109, 0x0, &(0x7f00000000c0)="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"}, 0x40) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 283.469389][ T8548] NFS: Device name not specified 09:44:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad, 0x0, &(0x7f00000000c0)="207ef39c5f3eb0bda7a300babe2bfe12b33cda3cc3ff5c560ec27c70f6703395095409094409842daaeebb502e93dfd323e5f2261543e81f2b3bd49a662db4d7224bf2e3460f83db56199fc524f63811b57782498db10c3a494a7f4c8474ede3d1a0c09bd2e1a614d783c46678dc4b15ddb2e70822d979328c5352021a2b8b55b49f44e6d4455e90757eaf79b430d125027a6eb3f3e9cd426e67ee5d27d543ca3e20338afe0a52d6f7ac5a5aff"}, 0x40) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:44:48 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfffffff9, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x20000200009e5c, 0x400000000000087f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 09:44:48 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:48 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r3, 0x0, 0x3ff) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x14, 0x12, 0x1}, 0x14}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_DEL_STATION(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="02002bbd7000fddbdf25140000000a0006002016990c8d9400000600b500ac0500000800a4000100"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x10) 09:44:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r1], 0x17) fcntl$addseals(r0, 0x409, 0x8) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) [ 283.603293][ T8555] NFS: Device name not specified 09:44:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) 09:44:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:44:50 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x34, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0xe, 'cake\x00'}, {0x4}}]}, 0x34}}, 0x0) 09:44:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r1], 0x17) fcntl$addseals(r0, 0x409, 0x8) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 09:44:50 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x21f, 0x0) 09:44:50 executing program 5: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfffffff9, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200009e7c, 0x87f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="a2510000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="74e697615f9bf56e"], 0x20}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe4) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[]}}, 0x4040892) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000840)=ANY=[@ANYBLOB="440000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="a2510000000000001c00128009000100766c616e000000000c000280060001000000000008000500d921b4a252cf48f7bbe4a82dc89a780368b2daf176e023e0973725be841e37fe5f786ecca8545561b74fad967900ac4ea38cce43e6bac2820320ee31aa9454ee6a294a45eef362c24f444f78cc9600da6dccc2a204572fb00b12ef7952ad8d121debbcccfc5ff84eafa23a153bdd11d008ea8cac7ba275bc27ae66dc73000000", @ANYRES32=r6, @ANYBLOB], 0x44}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000001000010400"/20, @ANYRES32=r6, @ANYBLOB="00e5000000000000"], 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000580)={0x10c, 0x0, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r7, 0x8982, &(0x7f0000000080)={0x0, 'vlan1\x00', {}, 0x9}) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 09:44:50 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x0, 0x0) 09:44:51 executing program 0: pipe(&(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x21f, 0x0) 09:44:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r1], 0x17) fcntl$addseals(r0, 0x409, 0x8) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 09:44:51 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x0, 0x0) [ 286.654880][ T8596] nfs: Unknown parameter '@' [ 286.662282][ T8591] netlink: 'syz-executor.3': attribute type 14 has an invalid length. [ 286.737996][ T8588] nfs: Unknown parameter '@' 09:44:51 executing program 0: pipe(&(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x21f, 0x0) 09:44:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:44:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/raw\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) [ 286.837746][ T8591] netlink: 'syz-executor.3': attribute type 14 has an invalid length. 09:44:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:44:54 executing program 5: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfffffff9, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200009e7c, 0x87f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="a2510000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32, @ANYBLOB], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="74e697615f9bf56e"], 0x20}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe4) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[]}}, 0x4040892) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000840)=ANY=[@ANYBLOB="440000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="a2510000000000001c00128009000100766c616e000000000c000280060001000000000008000500d921b4a252cf48f7bbe4a82dc89a780368b2daf176e023e0973725be841e37fe5f786ecca8545561b74fad967900ac4ea38cce43e6bac2820320ee31aa9454ee6a294a45eef362c24f444f78cc9600da6dccc2a204572fb00b12ef7952ad8d121debbcccfc5ff84eafa23a153bdd11d008ea8cac7ba275bc27ae66dc73000000", @ANYRES32=r6, @ANYBLOB], 0x44}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000001000010400"/20, @ANYRES32=r6, @ANYBLOB="00e5000000000000"], 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000006c0)={&(0x7f0000000580)={0x10c, 0x0, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r7, 0x8982, &(0x7f0000000080)={0x0, 'vlan1\x00', {}, 0x9}) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 09:44:54 executing program 0: pipe(&(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x21f, 0x0) 09:44:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:44:54 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@random="cbe91432c16c", @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f208", 0x18, 0x3a, 0x0, @empty, @private0, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}}}}, 0x0) 09:44:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000005200190f00003fffffffda060200000000e80001040000040d000a00ea1100000005000000", 0x43}], 0x1) recvmmsg(r0, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000009c0)=""/102396, 0x18ffc}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 09:44:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) [ 289.647467][ T8627] device geneve0 entered promiscuous mode 09:44:54 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) vmsplice(r1, &(0x7f0000000580)=[{&(0x7f0000001a00)="98", 0x1}], 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_pts(0xffffffffffffffff, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="66696c74657200000000000000000100000000000000000000000000000000000e00000004000000580200000000000000000000000000002c01000000000000c4010000c4010000c4010000c4010000c40100000400000000000000ac1e000100000000000000000000000076657468305f746f5f626f6e640000006772657461703000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700094000000000000000000000000000000004000000000240052454a45435400000000000000000000000000004969e6c8000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b0000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000e7ffffff000000000000000000000000ef0000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000001000000000000000014000000000028005345540000000000000000000000000000000002000000000000000000010000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000be625cc919ed5292b9000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 09:44:54 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x0, 0x0) 09:44:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:44:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) writev(r0, &(0x7f0000001380)=[{&(0x7f0000000200)="8f202adb", 0x4}], 0x1) [ 289.832034][ T8627] nfs: Unknown parameter '@' 09:44:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000040, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x80800) r3 = socket$inet6(0xa, 0x80002, 0x0) r4 = socket(0x11, 0x3, 0x0) bind(r4, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000000)={'lo\x00', r5}) sendto$inet6(r2, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0) [ 290.025890][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 290.074268][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:44:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:44:57 executing program 5: r0 = eventfd(0x9) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12, 0x0, @thr={&(0x7f0000000180)="5c40b6bed60ff3c22469dd0a3415a3d7dc1b173a571324c4da53231f2407c7cf4b2935", &(0x7f0000000480)="a3ca5b1e8c147348ce03f7f8ebd1b231835928cc0285d77cf295ff1e4751aaa20bee2ec8d93f1a82615c57ac3e49aebdf6c624169f5020f61e176b231c6c8810351f082a896564d6d7fe391305b27cb3e7e7f3248de669947caf2a6dead4d75ca56f15a9c9a03353f4e2e19263366af33f762c842b9a66f1f2d70f9cd745e279a3c097459ecdf98c840e19faf544c3e609e104755716af8a394d6b7dea4ee2e642011d0305e93cccd2fc78207af90b"}}, &(0x7f00009b1ffc)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0x5421, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000340)={0x101, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x88) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000140)={0x18, 0xf, 0x0, {{0x0, 0x0, 0x4}, 0xfffffffd}}, 0x18) flistxattr(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) close(r1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000440)={0x40, 0x0, 0x0, 0x0, 0x0, "6158055235866ba8"}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000400)={0x2, 0x4e5e, @dev}, 0x10) write$P9_RLINK(r1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fstat(r2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000080)=0x1) timer_settime(r3, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 09:44:57 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x0, 0x0) 09:44:57 executing program 4: r0 = eventfd(0xfbfffff8) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc)) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RCREATE(r1, &(0x7f0000000140)={0x18}, 0x18) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) close(r1) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2002, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 09:44:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:44:57 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write$P9_ROPEN(r0, 0x0, 0x0) 09:44:57 executing program 4: symlink(&(0x7f0000000080)='./file2\x00', &(0x7f00000000c0)='./file0\x00') rename(&(0x7f0000000500)='./file0\x00', &(0x7f0000000000)='./file2\x00') setxattr$security_evm(&(0x7f0000000140)='./file2\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@ng={0x4, 0x7, "bd"}, 0x3, 0x0) 09:44:57 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x0, 0x0) 09:44:57 executing program 5: r0 = eventfd(0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 09:44:57 executing program 3: sync() rename(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='./file1\x00') r0 = memfd_create(&(0x7f0000000580)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce(\xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87z\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\xfa\xa5\xb7\xd6\xa5&);\x1br\xd2a\xf2\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f\'\xba\x12', 0x0) pwrite64(r0, &(0x7f00000006c0)='/', 0x1, 0x0) 09:44:57 executing program 4: 09:44:57 executing program 0: 09:45:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0x80e45) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) lseek(0xffffffffffffffff, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) 09:45:00 executing program 5: 09:45:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:00 executing program 3: 09:45:00 executing program 4: 09:45:00 executing program 0: 09:45:00 executing program 3: 09:45:00 executing program 5: 09:45:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0x80e45) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) lseek(0xffffffffffffffff, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) 09:45:00 executing program 4: 09:45:00 executing program 0: 09:45:00 executing program 5: 09:45:00 executing program 3: 09:45:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0x80e45) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) lseek(0xffffffffffffffff, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) 09:45:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:03 executing program 4: 09:45:03 executing program 0: 09:45:03 executing program 5: 09:45:03 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r0, 0x409, 0x8) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 09:45:03 executing program 3: 09:45:03 executing program 5: 09:45:03 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r0, 0x409, 0x8) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 09:45:03 executing program 4: 09:45:03 executing program 0: 09:45:03 executing program 3: 09:45:03 executing program 4: [ 301.572371][ T0] NOHZ: local_softirq_pending 08 09:45:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:06 executing program 5: 09:45:06 executing program 0: 09:45:06 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r0, 0x409, 0x8) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 09:45:06 executing program 3: 09:45:06 executing program 4: 09:45:06 executing program 3: 09:45:06 executing program 4: 09:45:06 executing program 5: 09:45:06 executing program 0: 09:45:06 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:06 executing program 4: 09:45:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:09 executing program 3: 09:45:09 executing program 5: 09:45:09 executing program 0: 09:45:09 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:09 executing program 4: 09:45:09 executing program 5: 09:45:09 executing program 3: 09:45:09 executing program 0: 09:45:09 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:09 executing program 4: 09:45:09 executing program 3: 09:45:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:12 executing program 5: 09:45:12 executing program 0: 09:45:12 executing program 4: 09:45:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r0, 0x409, 0x8) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 09:45:12 executing program 3: 09:45:12 executing program 4: 09:45:12 executing program 0: 09:45:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r0, 0x409, 0x8) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 09:45:12 executing program 3: 09:45:12 executing program 5: 09:45:12 executing program 4: 09:45:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r0, 0x409, 0x8) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 09:45:15 executing program 3: 09:45:15 executing program 0: 09:45:15 executing program 5: 09:45:15 executing program 4: 09:45:15 executing program 5: 09:45:15 executing program 4: 09:45:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(0x0, 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 09:45:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c00000001080101"], 0x1}}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) readv(r2, &(0x7f0000000140)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1) 09:45:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet(r0, &(0x7f0000000a40)=[{{&(0x7f00000000c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000100)='v', 0x1}], 0x1}}], 0x1, 0x0) 09:45:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(0x0, 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @random="4ea35c9f13fc", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:45:15 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @empty, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, '\x00', 0x0, 0x2c, 0x0, @private0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}, 0x0) [ 311.485203][ T26] audit: type=1804 audit(1587462315.964:2): pid=8878 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir624512705/syzkaller.StHEXJ/45/cgroup.controllers" dev="sda1" ino=16051 res=1 [ 311.521401][ T8878] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 09:45:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) sendmmsg$unix(r0, &(0x7f0000008ac0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 09:45:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(0x0, 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmmsg$inet6(r2, &(0x7f0000006400)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000080)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x20000502}, {&(0x7f00000000c0)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x20000223}], 0x4}}], 0xd, 0xc000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) 09:45:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b63e069efb29797573b8530e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377", 0x0, 0x100, 0x6000000000000000}, 0x28) 09:45:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x0) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}]}, 0x40}}, 0x0) [ 311.918143][ T8909] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:45:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000005c0)="9000000018001f15b9409b0dffff00000200be0a02000605000003004300050003000000fac8388827a685a168d0bf46d32345653602648dcaaf6c26c291214549935ade4a460c89b6ec0cff3959547f509058ba86c902000000000000000400160012000a00000000000000000000000001000000f31ae9e086ceb6ac62bb944cf2e79be6aba4183b00000000000000", 0x90, 0x0, 0x0, 0x0) [ 312.134019][ T8921] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 312.146162][ T8921] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 09:45:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x0) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:19 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000280)={@link_local={0x3}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "bf6e00", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, @mcast2, {[], @echo_request}}}}}, 0x0) 09:45:19 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000140)) 09:45:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setpipe(r3, 0x407, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000007c0)={0x0, 0x1, 0x0, 0x8000, 0x2, [{0x2b, 0x0, 0x0, [], 0x800}, {0x0, 0x1ff, 0x80, [], 0x100}]}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x0) r5 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r4, r5, 0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="dc000000070a03000000000000000000000000020c000640000000000000000508000a40000000000900020073797a3200000000a5000740fa63903909b98651cc782e48b5beed6a0cb544a4838f0d0e04ef077abc1167560da1515698086ab2b84f6050a96eabce3def8d613bd68ae675765e005323315f8751a719ad93d3c840e9649f27efa16232ca8dba2bf8ffffffffffffff94ce15788cee9e5e379a7aa7c808ac7746dbe482725e0c36c66767594062529c9f4482de0fad21fdfe24955bc4ba2ff72e4c8d32686f4744b6"], 0x1}}, 0x44004) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x2, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000200)="4020ed2b259925f8029b533eb3a3a302ff7bba1d6d7012bfbb86bacd240d68a2441c1ed4089b65e8f9c22ac48f0afa39127c8a2ed704e431c1dc1f820532c9923a50953e481baaef62e4fb497c6a8443b20f5b69274286e88215269f44657c97190d2b129ed388ef7b", 0x69, 0x198000000}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 314.612834][ T8937] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:45:19 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x0, 0x0) truncate(0x0, 0x4d) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 09:45:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x0) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:19 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000280)={@link_local={0x3}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "bf6e00", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, @mcast2, {[], @echo_request}}}}}, 0x0) [ 314.810981][ T8951] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:45:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) [ 315.112315][ T8967] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 315.571772][ T26] audit: type=1800 audit(1587462320.054:3): pid=8936 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16080 res=0 09:45:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) sendfile(r2, r2, &(0x7f00000001c0), 0x0) 09:45:22 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) r1 = open(&(0x7f0000000580)='./bus\x00', 0x165502, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000000), 0x4) r2 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) write$UHID_DESTROY(r2, &(0x7f0000000000), 0x4) 09:45:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setpipe(r3, 0x407, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000007c0)={0x0, 0x1, 0x0, 0x8000, 0x2, [{0x2b, 0x0, 0x0, [], 0x800}, {0x0, 0x1ff, 0x80, [], 0x100}]}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x0) r5 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r4, r5, 0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="dc000000070a03000000000000000000000000020c000640000000000000000508000a40000000000900020073797a3200000000a5000740fa63903909b98651cc782e48b5beed6a0cb544a4838f0d0e04ef077abc1167560da1515698086ab2b84f6050a96eabce3def8d613bd68ae675765e005323315f8751a719ad93d3c840e9649f27efa16232ca8dba2bf8ffffffffffffff94ce15788cee9e5e379a7aa7c808ac7746dbe482725e0c36c66767594062529c9f4482de0fad21fdfe24955bc4ba2ff72e4c8d32686f4744b6"], 0x1}}, 0x44004) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x2, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000200)="4020ed2b259925f8029b533eb3a3a302ff7bba1d6d7012bfbb86bacd240d68a2441c1ed4089b65e8f9c22ac48f0afa39127c8a2ed704e431c1dc1f820532c9923a50953e481baaef62e4fb497c6a8443b20f5b69274286e88215269f44657c97190d2b129ed388ef7b", 0x69, 0x198000000}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 09:45:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:22 executing program 0: r0 = semget$private(0x0, 0x1, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000340)=""/140) 09:45:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000e63f741f000000000000ebff"}) r1 = syz_open_pts(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) dup2(r0, r1) 09:45:22 executing program 0: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x28120001) 09:45:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 09:45:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fsync(r2) 09:45:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) dup(0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, 0x0, 0x0) 09:45:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setpipe(r3, 0x407, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x2b}]}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x0) r5 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r4, r5, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x3, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000200)="4020ed2b259925f8029b533eb3a3a302ff7bba1d6d7012bfbb86bacd240d68a2441c1ed4089b65e8f9c22ac48f0afa39127c8a2ed704e431c1dc1f820532c9923a50953e481baaef62e4fb497c6a8443b20f5b69274286e88215269f44657c97190d2b129ed388ef7b", 0x69, 0x198000000}, {&(0x7f00000002c0)="1ad355ae19495754b7699f6fe1b00d1513230cf8a64f1f44ee610e6cce172c6c3e14807f28f008fed222b71c9857d6778b6a7c8e7469b92f910b2307f08e9e8ddb8e891f80fb1093c8c4f130f615e2ac2cb2d2b904d4455b569ad82d1f4b3680882ee446df40cc47e06aa834d52bc58ef7c3e2eae45a19bd9508b50d6f084ff62113d96e88125e40a63774ff807834b269ecf7b5327e6e7bab484ad02ceda745371662e8f008b7c8e20a9b786bb9fe", 0xaf, 0x6639956a}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 09:45:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:25 executing program 4: 09:45:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:25 executing program 4: 09:45:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x0) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:25 executing program 0: 09:45:25 executing program 4: 09:45:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 09:45:26 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setpipe(r3, 0x407, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x2b}]}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x0) r5 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r4, r5, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x3, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000200)="4020ed2b259925f8029b533eb3a3a302ff7bba1d6d7012bfbb86bacd240d68a2441c1ed4089b65e8f9c22ac48f0afa39127c8a2ed704e431c1dc1f820532c9923a50953e481baaef62e4fb497c6a8443b20f5b69274286e88215269f44657c97190d2b129ed388ef7b", 0x69, 0x198000000}, {&(0x7f00000002c0)="1ad355ae19495754b7699f6fe1b00d1513230cf8a64f1f44ee610e6cce172c6c3e14807f28f008fed222b71c9857d6778b6a7c8e7469b92f910b2307f08e9e8ddb8e891f80fb1093c8c4f130f615e2ac2cb2d2b904d4455b569ad82d1f4b3680882ee446df40cc47e06aa834d52bc58ef7c3e2eae45a19bd9508b50d6f084ff62113d96e88125e40a63774ff807834b269ecf7b5327e6e7bab484ad02ceda745371662e8f008b7c8e20a9b786bb9fe", 0xaf, 0x6639956a}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 09:45:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 09:45:26 executing program 0: 09:45:26 executing program 4: 09:45:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x0) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:26 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 09:45:26 executing program 4: 09:45:26 executing program 0: 09:45:26 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x0) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:27 executing program 5: 09:45:27 executing program 4: 09:45:27 executing program 0: 09:45:27 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r0, 0x409, 0x8) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 09:45:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:27 executing program 4: 09:45:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r0, 0x409, 0x8) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 09:45:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:27 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044dff, &(0x7f0000000040)) 09:45:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 09:45:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:27 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) ppoll(&(0x7f00000001c0)=[{r0, 0xf}, {r0}], 0x2, 0x0, 0x0, 0x0) 09:45:27 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x1, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) r2 = dup2(r1, r0) r3 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000280)={0xd, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="05630440000000000063404001"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000540)={0xc, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="03630840", @ANYRES64=r3], 0x0, 0x0, 0x0}) 09:45:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r0, 0x409, 0x8) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 09:45:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) listen(r0, 0x0) 09:45:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 09:45:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) [ 323.545195][ T9155] binder: BINDER_SET_CONTEXT_MGR already set [ 323.564431][ T9162] ptrace attach of "/root/syz-executor.1"[9157] was attempted by "/root/syz-executor.1"[9162] [ 323.577319][ T9155] binder: 9149:9155 ioctl 40046207 0 returned -16 [ 323.577358][ T9161] binder: BINDER_SET_CONTEXT_MGR already set 09:45:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 323.600203][ T9161] binder: 9149:9161 ioctl 40046207 0 returned -16 09:45:28 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000001001000001000000ec00000000000000937feecb07ab37918264a4d93e8d35b474759f7ed7bfa4efc7d97eea5b75d724ffff00000000000043e25d60825c9f14fbbc2e39b1484d4f1501b113d7d6030680a7fdea6f07ecd48502d57dda0132b56308a41dbb0600000000000000b6464a6f0a25c2d2ad823114b062750a4e96fa8be9ac82b2e4c391b88414287109fb11aa71f2de7befe81c73b24c9a28e628ad33cf7539e584cdabb9ce25829bdddf82f014316983eb7a4807d6370fdad41bc4e87aeff2f9af579d6d2bd6fe1c2e"], 0x18}}], 0x1, 0x0) close(r0) 09:45:28 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod(&(0x7f00000001c0)='./bus/file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000200)='./bus\x00') rename(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='./file0\x00') 09:45:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 323.730940][ T9175] ptrace attach of "/root/syz-executor.1"[9174] was attempted by "/root/syz-executor.1"[9175] 09:45:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000000)=0x1, 0x4) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0xff) 09:45:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:28 executing program 4: syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227b, &(0x7f0000000140)) 09:45:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect(r1, &(0x7f0000000000)=@rc, 0x80) dup2(r1, r0) connect(r0, &(0x7f0000000000)=@rc={0x1f, @none}, 0x80) [ 323.895639][ T9189] overlayfs: './file0' not a directory [ 323.908510][ T9192] ptrace attach of "/root/syz-executor.1"[9186] was attempted by "/root/syz-executor.1"[9192] 09:45:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8480, &(0x7f0000000200)={[{@grpid='grpid'}]}) 09:45:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 09:45:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 324.111244][ T9207] ptrace attach of "/root/syz-executor.1"[9206] was attempted by "/root/syz-executor.1"[9207] 09:45:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x21, 0x0, 0x0) 09:45:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, 0x0, 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 324.254283][ T9221] ptrace attach of "/root/syz-executor.1"[9218] was attempted by "/root/syz-executor.1"[9221] 09:45:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, 0x0, 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:28 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1001}, 0x4) 09:45:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 324.363338][ T9236] ptrace attach of "/root/syz-executor.1"[9235] was attempted by "/root/syz-executor.1"[9236] 09:45:28 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x100000003, 0x3a) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup2(r0, r1) 09:45:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040), 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x230, 0x0, 0x0, 0x98, 0x98, 0x198, 0x198, 0x198, 0x198, 0x198, 0x198, 0x3, 0x0, {[{{@ip={@broadcast, @multicast1, 0x0, 0x0, 'bridge_slave_1\x00', 'veth1\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}}}}, {{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'vlan0\x00', 'ip6_vti0\x00'}, 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x290) memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 09:45:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, 0x0, 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040), 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000002980)=[{&(0x7f0000001400)="7507746dfc7348be58ff6d7dd9bcc24bc9201e9ab3851c2352e456a59990f36599f89b848cf73dba62e0ee4d214b4ea417ba047283d923aa85916b00b017843fb4dd334d8bf4ab10c73e81992e6fd54138a794415b5cc26106b7db3a6b8796ce064e031f8f35e3f749cb730bb38dcfb2cf9155bf417d427a6ea7c2284e317a87736058c4140d8fe5d67450f4e38f91d2457b1f20672e51d2a112668d420a0711cb6ecd2cdbda5cc1dcb6e7722f539b78c41a5a843a8fbfcc66d3c38f8f9932463b5b7bb74cc5717d13", 0xc9}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001800)={0xd0, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @remote}}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0xd0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1fff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860073ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 324.524904][ T9250] Cannot find del_set index 0 as target [ 324.541670][ T9250] Cannot find del_set index 0 as target 09:45:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect(r1, &(0x7f0000000000)=@rc, 0x80) dup2(r1, r0) connect(r0, &(0x7f0000000000)=@rc={0x1f, @none}, 0x80) 09:45:29 executing program 5: syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2275, &(0x7f0000000140)) 09:45:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040), 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:31 executing program 5: clone(0x20002104ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:45:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r0, &(0x7f0000004b40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}], 0x1, 0x0, 0x0) 09:45:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 09:45:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000002980)=[{&(0x7f0000001400)="7507746dfc7348be58ff6d7dd9bcc24bc9201e9ab3851c2352e456a59990f36599f89b848cf73dba62e0ee4d214b4ea417ba047283d923aa85916b00b017843fb4dd334d8bf4ab10c73e81992e6fd54138a794415b5cc26106b7db3a6b8796ce064e031f8f35e3f749cb730bb38dcfb2cf9155bf417d427a6ea7c2284e317a87736058c4140d8fe5d67450f4e38f91d2457b1f20672e51d2a112668d420a0711cb6ecd2cdbda5cc1dcb6e7722f539b78c41a5a843a8fbfcc66d3c38f8f9932463b5b7bb74cc5717d13", 0xc9}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001800)={0xd0, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @remote}}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0xd0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1fff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860073ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 09:45:31 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x123b01, 0x0) 09:45:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:32 executing program 5: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000049000/0x18000)=nil, 0x0, 0x700, 0x0, 0x0, 0x0) 09:45:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:32 executing program 5: syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x6}) socket(0x10, 0x3, 0x0) 09:45:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) [ 327.762988][ T9316] debugfs: File 'dropped' in directory 'sg0' already present! [ 327.794067][ T9316] debugfs: File 'msg' in directory 'sg0' already present! [ 327.806970][ T9316] debugfs: File 'trace0' in directory 'sg0' already present! 09:45:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000140)={0x0, @loopback, 0x0, 0x0, 'sed\x00'}, 0x2c) ioctl$VIDIOC_G_PARM(0xffffffffffffffff, 0xc0cc5615, 0x0) 09:45:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) [ 328.069030][ T9328] IPVS: set_ctl: invalid protocol: 0 127.0.0.1:0 [ 328.082236][ T9328] IPVS: set_ctl: invalid protocol: 0 127.0.0.1:0 09:45:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 09:45:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 09:45:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) accept4$bt_l2cap(r0, 0x0, 0x0, 0x0) 09:45:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000000c0)='./file0\x00', 0xc2, 0x0) fallocate(r3, 0x0, 0x0, 0x10000) 09:45:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x0) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000002980)=[{&(0x7f0000001400)="7507746dfc7348be58ff6d7dd9bcc24bc9201e9ab3851c2352e456a59990f36599f89b848cf73dba62e0ee4d214b4ea417ba047283d923aa85916b00b017843fb4dd334d8bf4ab10c73e81992e6fd54138a794415b5cc26106b7db3a6b8796ce064e031f8f35e3f749cb730bb38dcfb2cf9155bf417d427a6ea7c2284e317a87736058c4140d8fe5d67450f4e38f91d2457b1f20672e51d2a112668d420a0711cb6ecd2cdbda5cc1dcb6e7722f539b78c41a5a843a8fbfcc66d3c38f8f9932463b5b7bb74cc5717d13", 0xc9}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001800)={0xd0, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @remote}}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0xd0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1fff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860073ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 09:45:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 09:45:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x0) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:35 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) 09:45:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 09:45:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000000c0)='./file0\x00', 0xc2, 0x0) fallocate(r3, 0x0, 0x0, 0x10000) 09:45:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x0) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:38 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 09:45:38 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) 09:45:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:38 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:45:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(0xffffffffffffffff, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:38 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x400000000000076, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a3, 0x48) 09:45:38 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) [ 333.757435][ T9385] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 333.796102][ T9385] device bond1 entered promiscuous mode [ 333.817488][ T9385] bond1 (unregistering): Released all slaves 09:45:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:38 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x400000000000076, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a3, 0x48) [ 333.864812][ T9422] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 09:45:38 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) [ 333.921901][ T9422] device bond1 entered promiscuous mode 09:45:38 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:45:38 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) [ 334.182013][ T9509] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 334.218939][ T9509] device bond2 entered promiscuous mode [ 334.237198][ T9544] bond2 (unregistering): Released all slaves 09:45:41 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 09:45:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(0xffffffffffffffff, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:41 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x400000000000076, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a3, 0x48) 09:45:41 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) 09:45:41 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:45:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) [ 336.859024][ T9588] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 09:45:41 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) [ 336.901529][ T9588] device bond2 entered promiscuous mode [ 336.947156][ T9588] bond2 (unregistering): Released all slaves 09:45:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$l2tp(0x2, 0x2, 0x73) 09:45:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:41 executing program 5: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) 09:45:41 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) [ 337.197052][ T9678] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 337.257840][ T9678] device bond2 entered promiscuous mode [ 337.273521][ T9680] bond2 (unregistering): Released all slaves 09:45:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 09:45:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(0xffffffffffffffff, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:44 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(r0, 0x0, 0x0) 09:45:44 executing program 5: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) 09:45:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}]}}}}}}}, 0x0) 09:45:44 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) [ 339.964779][ T9760] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 09:45:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 09:45:44 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(r0, 0x0, 0x0) 09:45:44 executing program 5: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) [ 340.013157][ T9760] device bond2 entered promiscuous mode 09:45:44 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) [ 340.115105][ T9803] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 340.184076][ T9809] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 09:45:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 340.228835][ T9809] device bond3 entered promiscuous mode [ 340.346007][ T9851] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:45:47 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 09:45:47 executing program 5: openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) 09:45:47 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(r0, 0x0, 0x0) 09:45:47 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:45:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 09:45:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:47 executing program 5: openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) [ 343.055038][ T9865] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 343.076198][ T9866] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:45:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}]}}}}}}}, 0x0) [ 343.123701][ T9865] device bond4 entered promiscuous mode [ 343.161340][ T9909] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:45:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}]}}}}}}}, 0x0) 09:45:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) shutdown(r0, 0x0) ioctl$DRM_IOCTL_MODE_DIRTYFB(0xffffffffffffffff, 0xc01864b1, 0x0) pipe(&(0x7f0000000200)) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) recvmmsg(r0, &(0x7f00000006c0), 0x1591, 0x0, 0x0) 09:45:47 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 09:45:47 executing program 5: openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x1) [ 343.328207][ T9917] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:45:50 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 09:45:50 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 09:45:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) 09:45:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}]}}}}}}}, 0x0) 09:45:50 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x1) 09:45:50 executing program 0: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x1000) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x8c540, 0x0) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x20010) 09:45:50 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 09:45:50 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x1) [ 346.164783][ T9940] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 346.191919][ T26] audit: type=1804 audit(1587462350.666:4): pid=9941 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir554170873/syzkaller.uPCdmV/85/bus" dev="sda1" ino=16245 res=1 09:45:50 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) [ 346.270196][ T26] audit: type=1800 audit(1587462350.706:5): pid=9941 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16245 res=0 09:45:50 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x1) 09:45:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) [ 346.353601][ T9951] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 09:45:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) [ 346.398696][ T26] audit: type=1804 audit(1587462350.706:6): pid=9941 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir554170873/syzkaller.uPCdmV/85/bus" dev="sda1" ino=16245 res=1 [ 346.443265][ T9951] device bond5 entered promiscuous mode [ 346.486554][ T26] audit: type=1804 audit(1587462350.966:7): pid=9990 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir554170873/syzkaller.uPCdmV/85/bus" dev="sda1" ino=16245 res=1 [ 346.578673][ T26] audit: type=1800 audit(1587462350.966:8): pid=9990 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16245 res=0 [ 346.617070][ T26] audit: type=1804 audit(1587462350.976:9): pid=9990 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir554170873/syzkaller.uPCdmV/85/bus" dev="sda1" ino=16245 res=1 09:45:53 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 09:45:53 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) 09:45:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) 09:45:53 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0), 0x0, 0x1) 09:45:53 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b", 0xfffffffffffffffc}, 0x60) 09:45:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) 09:45:53 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0), 0x0, 0x1) [ 349.261768][T10015] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 349.283158][T10015] bond6 (uninitialized): Released all slaves 09:45:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) 09:45:53 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @pix={0x0, 0x1f, 0x0, 0x0, 0x0, 0x8}}}) 09:45:53 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) 09:45:53 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0), 0x0, 0x1) 09:45:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r1, &(0x7f00000001c0), 0x80e45) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x3) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) [ 349.465826][T10033] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 349.488172][T10033] bond6 (uninitialized): Released all slaves 09:45:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:56 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x1) 09:45:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) 09:45:56 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:45:56 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000380)=ANY=[@ANYBLOB="e00000027f0000010100000002000000e0000001000000005b63645ef37b0bea26fec51f3a30572436fffd60fab08f075eebd822bca4042f821d63bed65715bca939cfe2e6143d41b064679ac39338453479468567bfd39e3c2533d3219af91441e8477684045b44663ad584690af2089c7febb80bf1d148cc67d0f32b2a1a3137f08e3a0474218eceece5a88b86c79b31fa9986690000000000e7f7ae9bfd87933913ebcf2346cde9fcd22f349ecaa921fecb6ae8d10037138af83035913514e60f66ff0f398a6e14389bcf8916766771e60edc2b8e029529ed7ed08d33b91e244929ed7bedbd1ec399d635c48a586f59272fd6787027"], 0x18) 09:45:56 executing program 2: syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000280)=""/4096, 0x1000) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x1000) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x8c540, 0x0) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x20010) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) [ 352.367605][ T26] audit: type=1804 audit(1587462356.846:10): pid=10057 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir262155127/syzkaller.NJlfcu/79/bus" dev="sda1" ino=16285 res=1 [ 352.402615][T10061] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 09:45:56 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0x5a, 0xa01}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 352.451226][T10061] device bond6 entered promiscuous mode 09:45:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x5, 0x0) getsockname$unix(r2, 0x0, 0x0) 09:45:57 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x1) [ 352.496126][ T26] audit: type=1800 audit(1587462356.876:11): pid=10057 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16285 res=0 09:45:57 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:45:57 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x1) [ 352.633978][ T26] audit: type=1804 audit(1587462356.886:12): pid=10057 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir262155127/syzkaller.NJlfcu/79/bus" dev="sda1" ino=16285 res=1 09:45:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x5, 0x0) getsockname$unix(r2, 0x0, 0x0) [ 352.703402][T10099] syz-executor.2 (10099) used greatest stack depth: 10744 bytes left [ 352.729733][ T26] audit: type=1804 audit(1587462357.056:13): pid=10057 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir262155127/syzkaller.NJlfcu/79/bus" dev="sda1" ino=16285 res=1 [ 352.735171][T10112] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 352.769564][ T26] audit: type=1800 audit(1587462357.056:14): pid=10057 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16285 res=0 [ 352.792628][ T26] audit: type=1804 audit(1587462357.056:15): pid=10099 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir262155127/syzkaller.NJlfcu/79/bus" dev="sda1" ino=16285 res=1 [ 352.826852][T10112] device bond7 entered promiscuous mode 09:45:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:45:59 executing program 2: syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000280)=""/4096, 0x1000) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x1000) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x8c540, 0x0) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x20010) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 09:45:59 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x0) 09:45:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x5, 0x0) getsockname$unix(r2, 0x0, 0x0) 09:45:59 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:45:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540), 0x0, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) open(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f00000001c0)={0x0, 0x2}) [ 355.456386][T10164] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 355.473517][T10164] device bond8 entered promiscuous mode 09:46:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) 09:46:00 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r2, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 09:46:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) 09:46:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540), 0x0, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) open(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f00000001c0)={0x0, 0x2}) [ 355.583506][ T26] audit: type=1804 audit(1587462360.067:16): pid=10201 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir262155127/syzkaller.NJlfcu/80/bus" dev="sda1" ino=16308 res=1 09:46:00 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x0) 09:46:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) [ 355.683753][ T26] audit: type=1800 audit(1587462360.067:17): pid=10201 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16308 res=0 [ 355.713434][T10214] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 355.734049][T10214] bond9 (uninitialized): Released all slaves [ 355.782093][ T26] audit: type=1804 audit(1587462360.117:18): pid=10201 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir262155127/syzkaller.NJlfcu/80/bus" dev="sda1" ino=16308 res=1 [ 355.928985][T10201] syz-executor.2 (10201) used greatest stack depth: 10360 bytes left 09:46:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:46:03 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r2, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 09:46:03 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0x0) 09:46:03 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x540) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @pix={0x600, 0x1f}}}) 09:46:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r1, 0x0, 0x0) 09:46:03 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @broadcast}) 09:46:03 executing program 5: 09:46:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r1, 0x0, 0x0) 09:46:03 executing program 0: 09:46:03 executing program 5: [ 358.790238][T10245] device hsr0 entered promiscuous mode [ 358.818653][T10245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:46:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r1, 0x0, 0x0) 09:46:03 executing program 5: [ 358.858181][T10249] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 358.887803][T10249] bond9 (uninitialized): Released all slaves [ 358.926801][T10238] device hsr0 left promiscuous mode [ 359.068848][T10254] device hsr0 entered promiscuous mode [ 359.074982][T10254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:46:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:46:06 executing program 0: 09:46:06 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r0, 0x0, 0x0) 09:46:06 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r2, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 09:46:06 executing program 5: 09:46:06 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @broadcast}) [ 361.673164][T10269] device hsr0 left promiscuous mode 09:46:06 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00', @broadcast}) [ 361.755460][T10273] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 361.786560][T10273] bond9 (uninitialized): Released all slaves 09:46:06 executing program 5: 09:46:06 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r0, 0x0, 0x0) [ 361.802988][T10269] device hsr0 entered promiscuous mode [ 361.810304][T10269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:46:06 executing program 2: 09:46:06 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r2, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 09:46:06 executing program 5: [ 361.991456][T10285] device hsr0 entered promiscuous mode [ 362.028964][T10285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:46:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:46:09 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r0, 0x0, 0x0) 09:46:09 executing program 2: 09:46:09 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r2, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 09:46:09 executing program 0: 09:46:09 executing program 5: 09:46:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0x14, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_INACTIVITY_TOUT={0x8, 0x1, 0x10001}, @__IFLA_CAIF_HSI_HEAD_ALIGN={0x8}]}}}]}, 0x44}}, 0x0) 09:46:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000001000390400"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3c}}, 0x0) 09:46:09 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) ioctl$BLKPG(r0, 0x40140921, 0x0) 09:46:09 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r1, 0x0, 0x0) 09:46:09 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r2, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 364.977983][T10313] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 09:46:09 executing program 5: r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xfffffe43) preadv(0xffffffffffffffff, &(0x7f0000001480), 0x0, 0x4000) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xd6, 0x80000) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, 0x0, 0x4050090) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x4) 09:46:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:46:12 executing program 2: 09:46:12 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:46:12 executing program 0: 09:46:12 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r1, 0x0, 0x0) 09:46:12 executing program 5: r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xfffffe43) preadv(0xffffffffffffffff, &(0x7f0000001480), 0x0, 0x4000) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xd6, 0x80000) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, 0x0, 0x4050090) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x4) 09:46:12 executing program 2: timer_create(0x2, &(0x7f0000000000)={0x0, 0x1c, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{}, {0x0, r0+10000000}}, 0x0) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000000140)={{0x77359400}, {0x0, 0x9}}, 0x0) [ 368.005118][T10344] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 368.036608][T10344] device bond9 entered promiscuous mode [ 368.046452][T10344] bond9 (unregistering): Released all slaves 09:46:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x207c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='numa_maps\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x2202, 0x0) sendfile(r1, r0, 0x0, 0x20000000000000d8) 09:46:12 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r1, 0x0, 0x0) 09:46:12 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:46:12 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000000)=0x9, 0x4) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000000)=0x9, 0x4) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0xffff, 0x2}, 0x6) dup2(r0, r1) [ 368.276158][T10426] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 09:46:12 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r1, 0x0, 0x0) [ 368.345384][T10426] device bond9 entered promiscuous mode [ 368.377388][T10433] bond9 (unregistering): Released all slaves 09:46:15 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r2, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 09:46:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 09:46:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000004700)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x4c456b1e4edbcc3e}]}}}]}, 0x3c}}, 0x0) 09:46:15 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r1, 0x0, 0x0) 09:46:15 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup3(r1, r0, 0x0) 09:46:15 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000000)=0x9, 0x4) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000000)=0x89, 0x4) [ 371.037515][T10512] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 371.067205][T10512] device bond9 entered promiscuous mode 09:46:15 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x7bae456a0a121d22) [ 371.096633][T10512] bond9 (unregistering): Released all slaves 09:46:15 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf00}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) 09:46:15 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r1, 0x0, 0x0) 09:46:15 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r2, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 09:46:15 executing program 2: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) r2 = fanotify_init(0x0, 0x0) r3 = epoll_create1(0x0) r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) fanotify_mark(r2, 0x51, 0x8000038, r4, 0x0) fanotify_mark(r2, 0x12, 0x48000038, r1, 0x0) 09:46:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r1, 0x0, 0x0) 09:46:15 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 371.345050][T10599] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 371.415043][T10599] device bond9 entered promiscuous mode [ 371.435099][T10603] bond9 (unregistering): Released all slaves 09:46:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 09:46:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r1, 0x0, 0x0) 09:46:18 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0xb69370e56cf98e5d) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x100000, r0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0x7}, 0x7) socketpair(0x15, 0x5, 0x1000000, &(0x7f000000dff8)={0xffffffffffffffff}) close(r2) socket$inet(0x2, 0x4000000000000001, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x7, &(0x7f0000000040)=0x3c00, 0x4) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r4, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x1, 0x0, @dev={[], 0x1a}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) listen(r4, 0x2) accept4$llc(r4, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x2, 0x80000) 09:46:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a7bbe92b1588c1b6a238e344ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d66527756d0ac81399ac0582b151d141fe83ed1d9132ab025c5630cca8a430aeff83dd7770e5485b3580e6c2bcff78ebabc56f554ff14196fa347774c415acdeb046e3cf8a5af638ef519604604bdd8af702effc26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce652179a6f2fbcded42fa3aa394ade7dfe439c6479605528726a068c00"/244], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 09:46:18 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r2, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 09:46:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup3(r1, r0, 0x0) [ 374.182909][T10685] device bridge1 entered promiscuous mode 09:46:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r1, 0x0, 0x0) [ 374.227324][T10694] device bridge_slave_0 left promiscuous mode [ 374.254915][T10692] llc_conn_state_process: llc_conn_service failed [ 374.261705][T10694] bridge0: port 1(bridge_slave_0) entered disabled state 09:46:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) [ 374.328370][T10694] bridge1: port 1(bridge_slave_0) entered blocking state [ 374.338368][T10694] bridge1: port 1(bridge_slave_0) entered disabled state [ 374.358876][T10694] device bridge_slave_0 entered promiscuous mode 09:46:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) [ 374.372623][T10694] bridge1: port 1(bridge_slave_0) entered blocking state [ 374.379752][T10694] bridge1: port 1(bridge_slave_0) entered forwarding state [ 374.399853][T10695] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 374.431974][T10695] device bond9 entered promiscuous mode [ 374.443809][T10700] bond9 (unregistering): Released all slaves 09:46:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a7bbe92b1588c1b6a238e344ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d66527756d0ac81399ac0582b151d141fe83ed1d9132ab025c5630cca8a430aeff83dd7770e5485b3580e6c2bcff78ebabc56f554ff14196fa347774c415acdeb046e3cf8a5af638ef519604604bdd8af702effc26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce652179a6f2fbcded42fa3aa394ade7dfe439c6479605528726a068c00"/244], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 09:46:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) 09:46:19 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r2, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 374.600573][T10776] device bridge2 entered promiscuous mode [ 374.622277][T10782] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 374.643600][T10782] device bond9 entered promiscuous mode [ 374.662475][T10776] device bridge_slave_0 left promiscuous mode [ 374.677709][T10776] bridge1: port 1(bridge_slave_0) entered disabled state [ 374.719661][T10776] bridge2: port 1(bridge_slave_0) entered blocking state [ 374.726934][T10776] bridge2: port 1(bridge_slave_0) entered disabled state [ 374.735100][T10776] device bridge_slave_0 entered promiscuous mode [ 374.742397][T10776] bridge2: port 1(bridge_slave_0) entered blocking state [ 374.749701][T10776] bridge2: port 1(bridge_slave_0) entered forwarding state [ 374.760400][T10782] bond9 (unregistering): Released all slaves [ 374.984700][T10853] llc_conn_state_process: llc_conn_service failed 09:46:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 09:46:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x5, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) 09:46:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) 09:46:21 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r2, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 09:46:21 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup3(r1, r0, 0x0) 09:46:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') renameat2(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x0) 09:46:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x5, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) 09:46:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x3c}}, 0x0) [ 377.308486][T10866] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 09:46:21 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0xffff}, 0x6) dup2(r0, r1) [ 377.371425][T10866] device bond9 entered promiscuous mode [ 377.398533][T10888] bond9 (unregistering): Released all slaves [ 377.409536][T10911] (unnamed net_device) (uninitialized): Unable to set down delay as MII monitoring is disabled 09:46:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x5, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) 09:46:22 executing program 5: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200), 0xc, 0x0}, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 09:46:22 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r2, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 377.585074][T10960] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 377.606636][T10960] device bond9 entered promiscuous mode [ 377.616673][T10960] bond9 (unregistering): Released all slaves 09:46:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:46:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x0, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) 09:46:24 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:46:24 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x48280) ftruncate(r0, 0x48280) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) 09:46:24 executing program 5: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200), 0xc, 0x0}, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 09:46:24 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup3(r1, r0, 0x0) [ 380.376284][T11044] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 380.411114][ T26] audit: type=1804 audit(1587462384.898:19): pid=11045 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir262155127/syzkaller.NJlfcu/96/bus" dev="sda1" ino=16378 res=1 [ 380.445263][T11044] device bond9 entered promiscuous mode [ 380.466135][T11080] bond9 (unregistering): Released all slaves 09:46:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=@ipv6_delroute={0x24, 0x19, 0x401, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r2}]}, 0x24}}, 0x0) 09:46:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x0, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) [ 380.478122][ T26] audit: type=1804 audit(1587462384.938:20): pid=11079 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir262155127/syzkaller.NJlfcu/96/bus" dev="sda1" ino=16378 res=1 09:46:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) getdents(r0, &(0x7f0000000200)=""/116, 0x74) 09:46:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x1}, 0x50) creat(&(0x7f0000000080)='./file0/file0/file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000480)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, 0x90) 09:46:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:46:25 executing program 5: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200), 0xc, 0x0}, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 380.751397][T11135] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 380.795412][T11135] device bond9 entered promiscuous mode [ 380.823105][T11143] bond9 (unregistering): Released all slaves [ 382.838035][ T0] NOHZ: local_softirq_pending 08 09:46:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c248ecaba793a4f7c1b09632388cd8558c93fba01c0f3736bb72ca1e78542e11f939f0265c321aba72a56c891cc69a0b4dafbc31dadd5d935266994d6b13f483f4cc8ca4172e39d1f4eabf1290302", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 09:46:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x0, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) 09:46:27 executing program 5: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200), 0xc, 0x0}, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) 09:46:27 executing program 4: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:46:27 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) dup3(r1, r0, 0x0) 09:46:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x119}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) [ 383.504626][T11233] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 383.523002][T11233] device bond9 entered promiscuous mode [ 383.537520][T11233] bond9 (unregistering): Released all slaves 09:46:28 executing program 4: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010008506040021000000e8ff00000080", @ANYRES32=r3, @ANYBLOB="fef9ff00000000001c0012000c000100626f6e64000000000c000200080001000100000075f8b2fc03e90029b76e2e4e186b6124271777f4ce3b06eb3cbb5c0aba4cd466f5e91806418a437701efe04ed9156bd4645bb460a1498575eb7928b7dea017311d941fc46950de73a81abf0a641398bc7b8673eb001da6348a6c3e3cebd0c3e35646b0f967b63bb38e62b7b25c1e1cfb27a03616e36617a0efa7f7c0b936ddfb2c005ec9f5d7be11515b09c321520a5135bc9a69c743c48ea2b7050c3196f03d1802c1"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 09:46:28 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001cc0), 0x1006) sendfile(r0, r0, &(0x7f0000000240), 0x2008000fffffffe) 09:46:28 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) dup3(r1, r0, 0x0) 09:46:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) [ 383.692615][T11311] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 383.723183][T11311] device bond9 entered promiscuous mode 09:46:28 executing program 5: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) [ 383.752197][T11347] bond9 (unregistering): Released all slaves 09:46:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$unix(r2, 0x0, 0x0) [ 384.708378][T11405] ================================================================== [ 384.716546][T11405] BUG: KCSAN: data-race in generic_file_read_iter / simple_write_end [ 384.724602][T11405] [ 384.726934][T11405] write to 0xffff888120ed0d70 of 8 bytes by task 11388 on cpu 0: [ 384.734656][T11405] simple_write_end+0x1cc/0x370 [ 384.739516][T11405] generic_perform_write+0x1d7/0x320 [ 384.744815][T11405] __generic_file_write_iter+0x240/0x370 [ 384.750464][T11405] generic_file_write_iter+0x294/0x38e [ 384.755935][T11405] do_iter_readv_writev+0x4a7/0x5d0 [ 384.761148][T11405] do_iter_write+0x137/0x3a0 [ 384.765757][T11405] vfs_iter_write+0x56/0x80 [ 384.770303][T11405] iter_file_splice_write+0x530/0x830 [ 384.775684][T11405] direct_splice_actor+0x97/0xb0 [ 384.780631][T11405] splice_direct_to_actor+0x22f/0x540 [ 384.786010][T11405] do_splice_direct+0x152/0x1d0 [ 384.790859][T11405] do_sendfile+0x380/0x800 [ 384.795288][T11405] __x64_sys_sendfile64+0xb8/0x140 [ 384.800422][T11405] do_syscall_64+0xc7/0x3b0 [ 384.804960][T11405] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 384.810850][T11405] [ 384.813188][T11405] read to 0xffff888120ed0d70 of 8 bytes by task 11405 on cpu 1: [ 384.820831][T11405] generic_file_read_iter+0x85b/0x14e0 [ 384.826842][T11405] generic_file_splice_read+0x2df/0x470 [ 384.832717][T11405] do_splice_to+0xc7/0x100 [ 384.837152][T11405] splice_direct_to_actor+0x1b9/0x540 [ 384.842576][T11405] do_splice_direct+0x152/0x1d0 [ 384.847717][T11405] do_sendfile+0x380/0x800 [ 384.852227][T11405] __x64_sys_sendfile64+0xb8/0x140 [ 384.857462][T11405] do_syscall_64+0xc7/0x3b0 [ 384.861979][T11405] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 384.867864][T11405] [ 384.870190][T11405] Reported by Kernel Concurrency Sanitizer on: [ 384.876346][T11405] CPU: 1 PID: 11405 Comm: syz-executor.2 Not tainted 5.7.0-rc1-syzkaller #0 [ 384.885193][T11405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.895423][T11405] ================================================================== [ 384.903578][T11405] Kernel panic - not syncing: panic_on_warn set ... [ 384.910206][T11405] CPU: 1 PID: 11405 Comm: syz-executor.2 Not tainted 5.7.0-rc1-syzkaller #0 [ 384.920708][T11405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.931029][T11405] Call Trace: [ 384.934420][T11405] dump_stack+0x11d/0x187 [ 384.938766][T11405] panic+0x210/0x640 [ 384.942666][T11405] ? vprintk_func+0x89/0x13a [ 384.947265][T11405] kcsan_report.cold+0xc/0x1a [ 384.951961][T11405] kcsan_setup_watchpoint+0x3fb/0x440 [ 384.957657][T11405] generic_file_read_iter+0x85b/0x14e0 [ 384.963140][T11405] generic_file_splice_read+0x2df/0x470 [ 384.968699][T11405] ? add_to_pipe+0x1b0/0x1b0 [ 384.973301][T11405] do_splice_to+0xc7/0x100 [ 384.977740][T11405] splice_direct_to_actor+0x1b9/0x540 [ 384.983144][T11405] ? generic_pipe_buf_nosteal+0x20/0x20 [ 384.988697][T11405] do_splice_direct+0x152/0x1d0 [ 384.993566][T11405] do_sendfile+0x380/0x800 [ 384.998005][T11405] __x64_sys_sendfile64+0xb8/0x140 [ 385.003133][T11405] do_syscall_64+0xc7/0x3b0 [ 385.007648][T11405] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 385.014500][T11405] RIP: 0033:0x45c829 [ 385.019359][T11405] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.039663][T11405] RSP: 002b:00007fd2b8b01c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 385.048196][T11405] RAX: ffffffffffffffda RBX: 00000000004fc040 RCX: 000000000045c829 [ 385.056186][T11405] RDX: 0000000020000240 RSI: 0000000000000004 RDI: 0000000000000004 [ 385.064170][T11405] RBP: 000000000078c040 R08: 0000000000000000 R09: 0000000000000000 [ 385.072153][T11405] R10: 02008000fffffffe R11: 0000000000000246 R12: 00000000ffffffff [ 385.080649][T11405] R13: 00000000000008d6 R14: 00000000004cb7a1 R15: 00007fd2b8b026d4 [ 385.091934][T11405] Kernel Offset: disabled [ 385.096287][T11405] Rebooting in 86400 seconds..