'-/proc\x00', 0x13e, 0x0) 00:46:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2716.807381] XFS (loop3): Invalid superblock magic number [ 2716.857946] FAULT_INJECTION: forcing a failure. [ 2716.857946] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2716.860042] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2716.869812] CPU: 1 PID: 30693 Comm: syz-executor5 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2716.869821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2716.869832] Call Trace: [ 2716.897775] dump_stack+0x1c9/0x2b4 [ 2716.901416] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2716.906616] ? trace_hardirqs_on+0x10/0x10 [ 2716.910860] should_fail.cold.4+0xa/0x11 [ 2716.914932] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2716.920044] ? security_inode_permission+0xd2/0x100 [ 2716.925074] ? lock_acquire+0x1e4/0x540 [ 2716.929062] ? trace_hardirqs_on+0x10/0x10 [ 2716.933307] ? lock_release+0xa30/0xa30 [ 2716.937288] ? check_same_owner+0x340/0x340 [ 2716.940993] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2716.941620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2716.941635] ? _parse_integer+0x13b/0x190 [ 2716.941654] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2716.964450] ? _kstrtoull+0x188/0x250 [ 2716.968259] ? _parse_integer+0x190/0x190 [ 2716.972407] ? lock_release+0xa30/0xa30 [ 2716.976379] ? check_same_owner+0x340/0x340 [ 2716.980708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2716.986251] ? should_fail+0x246/0xd86 [ 2716.990150] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2716.995266] __alloc_pages_nodemask+0x36e/0xdb0 [ 2716.996947] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2716.999942] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 2716.999958] ? find_vpid+0xf0/0xf0 [ 2716.999979] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 2717.020944] ? __f_unlock_pos+0x19/0x20 [ 2717.024933] ? lock_acquire+0x1e4/0x540 [ 2717.028911] ? fs_reclaim_acquire+0x20/0x20 [ 2717.033232] ? lock_downgrade+0x8f0/0x8f0 [ 2717.037381] ? lock_release+0xa30/0xa30 [ 2717.041355] ? check_same_owner+0x340/0x340 [ 2717.045683] cache_grow_begin+0x91/0x710 [ 2717.049750] kmem_cache_alloc+0x689/0x760 [ 2717.053897] ? fsnotify_first_mark+0x350/0x350 [ 2717.058490] ? __fsnotify_parent+0xcc/0x420 [ 2717.059395] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2717.062817] getname_flags+0xd0/0x5a0 [ 2717.062833] user_path_at_empty+0x2d/0x50 [ 2717.062850] path_setxattr+0xd6/0x230 [ 2717.082194] ? setxattr+0x450/0x450 [ 2717.085833] ? __ia32_sys_read+0xb0/0xb0 [ 2717.089895] ? __ia32_sys_unlink+0x50/0x50 [ 2717.094131] __x64_sys_lsetxattr+0xc1/0x150 [ 2717.098454] do_syscall_64+0x1b9/0x820 [ 2717.102347] ? finish_task_switch+0x1d3/0x870 00:46:44 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0(', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:44 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:44 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530e4", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:44 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2717.106847] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2717.111777] ? syscall_return_slowpath+0x31d/0x5e0 [ 2717.116715] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2717.121184] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2717.121743] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2717.121763] ? perf_trace_sys_enter+0xb10/0xb10 [ 2717.139040] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2717.143890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2717.149078] RIP: 0033:0x455ba9 [ 2717.152259] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2717.171508] RSP: 002b:00007fc2ebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2717.179219] RAX: ffffffffffffffda RBX: 00007fc2ebe026d4 RCX: 0000000000455ba9 [ 2717.186495] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000020000040 [ 2717.193767] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2717.201041] R10: 000000000000013e R11: 0000000000000246 R12: 0000000000000013 [ 2717.208311] R13: 00000000004c01cc R14: 00000000004cf820 R15: 0000000000000001 00:46:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:44 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:44 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03011aa31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:44 executing program 5 (fault-call:2 fault-nth:2): stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:44 executing program 0: uselib(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f0000000140)='security.evm\x00', 0x27e, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x880, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'nat\x00'}, &(0x7f0000000240)=0x78) 00:46:44 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x4305000000000000]}) [ 2717.291362] XFS (loop3): Invalid superblock magic number 00:46:44 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) io_setup(0x65, &(0x7f0000000080)=0x0) r1 = socket$unix(0x1, 0x7, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x400000, 0x0) io_cancel(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x8, r1, &(0x7f00000001c0)="cbaae42bfeaad6106555291379475bd2ae72da4d2c443ac63e78ab22fb6e3821b5fa19019c8d80cc45272e08fc0161f938227b044bddb235a6d1019845eee33b5a2a9deadde2c949be2f069b5214cdb12c800d0d", 0x54, 0x1ff, 0x0, 0x0, r2}, &(0x7f0000000280)) unlink(&(0x7f0000000000)='./file0\x00') 00:46:44 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301e3a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:44 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x8035000000000000]}) 00:46:44 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2717.350968] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:44 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece035b01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:44 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x88caffff]}) [ 2717.456489] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:44 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:44 executing program 0: lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x4, 0x840) epoll_pwait(r0, &(0x7f0000000140)=[{}, {}, {}], 0x3, 0x800, &(0x7f0000000180)={0x4}, 0x8) unlink(&(0x7f0000000000)='./file0\x00') [ 2717.528758] XFS (loop3): Invalid superblock magic number [ 2717.592754] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2717.606562] FAULT_INJECTION: forcing a failure. [ 2717.606562] name failslab, interval 1, probability 0, space 0, times 0 [ 2717.617848] CPU: 1 PID: 30778 Comm: syz-executor5 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2717.626248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2717.635597] Call Trace: [ 2717.638196] dump_stack+0x1c9/0x2b4 [ 2717.641837] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2717.647033] ? lock_release+0xa30/0xa30 [ 2717.651017] should_fail.cold.4+0xa/0x11 [ 2717.655086] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2717.660190] ? is_bpf_text_address+0xd7/0x170 [ 2717.664681] ? kernel_text_address+0x79/0xf0 [ 2717.669088] ? __kernel_text_address+0xd/0x40 [ 2717.673585] ? unwind_get_return_address+0x61/0xa0 [ 2717.678517] ? __save_stack_trace+0x8d/0xf0 [ 2717.682850] ? trace_hardirqs_on+0x10/0x10 [ 2717.687094] ? lock_acquire+0x1e4/0x540 [ 2717.691072] ? fs_reclaim_acquire+0x20/0x20 [ 2717.695400] ? lock_downgrade+0x8f0/0x8f0 [ 2717.699558] ? check_same_owner+0x340/0x340 [ 2717.703883] ? usercopy_warn+0x120/0x120 [ 2717.707948] ? rcu_note_context_switch+0x730/0x730 [ 2717.712879] ? kasan_check_write+0x14/0x20 [ 2717.717119] __should_failslab+0x124/0x180 [ 2717.721358] should_failslab+0x9/0x14 [ 2717.725163] kmem_cache_alloc_node_trace+0x26f/0x770 [ 2717.730269] ? strncpy_from_user+0x3be/0x510 [ 2717.734688] __kmalloc_node+0x33/0x70 [ 2717.738498] kvmalloc_node+0x65/0xf0 [ 2717.742222] setxattr+0x1a3/0x450 [ 2717.745677] ? vfs_setxattr+0x100/0x100 [ 2717.749661] ? lock_acquire+0x1e4/0x540 [ 2717.753643] ? mnt_want_write+0x3f/0xc0 [ 2717.757625] ? lock_release+0xa30/0xa30 [ 2717.761607] ? check_same_owner+0x340/0x340 [ 2717.765929] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2717.771452] ? __mnt_want_write+0x2f9/0x3e0 [ 2717.775758] ? may_umount_tree+0x220/0x220 [ 2717.780006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2717.785534] ? __sb_start_write+0x17f/0x300 [ 2717.789843] path_setxattr+0x1e3/0x230 [ 2717.793714] ? setxattr+0x450/0x450 [ 2717.797328] __x64_sys_lsetxattr+0xc1/0x150 [ 2717.801632] do_syscall_64+0x1b9/0x820 [ 2717.805501] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2717.810421] ? syscall_return_slowpath+0x31d/0x5e0 [ 2717.815337] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2717.820347] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2717.825344] ? perf_trace_sys_enter+0xb10/0xb10 [ 2717.830001] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2717.834834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2717.840002] RIP: 0033:0x455ba9 [ 2717.843184] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2717.862320] RSP: 002b:00007fc2ebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2717.870027] RAX: ffffffffffffffda RBX: 00007fc2ebe026d4 RCX: 0000000000455ba9 [ 2717.877298] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000020000040 [ 2717.884551] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 00:46:45 executing program 5 (fault-call:2 fault-nth:3): stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:45 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03bb01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:45 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530e0", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:45 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x7000000]}) 00:46:45 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=@known='security.evm\x00', &(0x7f00000001c0)='security.evm\x00', 0xd, 0x1) unlink(&(0x7f0000000000)='./file0\x00') 00:46:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000200", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2717.891817] R10: 000000000000013e R11: 0000000000000246 R12: 0000000000000013 [ 2717.899065] R13: 00000000004c01cc R14: 00000000004cf820 R15: 0000000000000002 00:46:45 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:45 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece039401a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:45 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000001c0), &(0x7f0000000240)=0x4) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000280)=0x103000) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)='&\x00') unlink(&(0x7f0000000000)='./file0\x00') [ 2717.942220] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2717.957182] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:46:45 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x80, 0x0) openat$cgroup_type(r0, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) [ 2718.004781] FAULT_INJECTION: forcing a failure. [ 2718.004781] name failslab, interval 1, probability 0, space 0, times 0 [ 2718.016069] CPU: 0 PID: 30861 Comm: syz-executor5 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2718.024471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2718.033827] Call Trace: [ 2718.036424] dump_stack+0x1c9/0x2b4 [ 2718.040054] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2718.045246] ? trace_hardirqs_on+0x10/0x10 [ 2718.049487] should_fail.cold.4+0xa/0x11 [ 2718.053552] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2718.058660] ? lock_release+0xa30/0xa30 [ 2718.062638] ? __wake_up_common_lock+0x1d0/0x330 [ 2718.067400] ? __unlock_page_memcg+0x53/0x100 [ 2718.071907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2718.077443] ? trace_hardirqs_on+0x10/0x10 [ 2718.081674] ? __find_get_block+0x36d/0xe60 [ 2718.086003] ? iput+0x63a/0xaa0 [ 2718.089290] ? inode_add_lru+0x2a0/0x2a0 [ 2718.093354] ? lock_release+0xa30/0xa30 [ 2718.097333] ? trace_hardirqs_on+0x10/0x10 [ 2718.101575] ? rcu_is_watching+0x8c/0x150 [ 2718.105731] ? check_same_owner+0x340/0x340 [ 2718.110039] ? rcu_note_context_switch+0x730/0x730 [ 2718.114957] __should_failslab+0x124/0x180 [ 2718.119178] should_failslab+0x9/0x14 [ 2718.122964] __kmalloc+0x2c8/0x760 [ 2718.126490] ? start_this_handle+0x589/0x1260 [ 2718.130969] ? ext4_xattr_block_set+0xaae/0x44d0 [ 2718.135707] ext4_xattr_block_set+0xaae/0x44d0 [ 2718.140274] ? ext4_xattr_inode_get+0xa20/0xa20 [ 2718.144931] ? lock_downgrade+0x8f0/0x8f0 [ 2718.149062] ? ext4_xattr_ibody_set+0x2c0/0x2c0 [ 2718.153714] ? jbd2_journal_free_reserved+0x110/0x110 [ 2718.158890] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2718.163891] ? ext4_get_group_desc+0x1cd/0x2d0 [ 2718.168456] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2718.173975] ? __ext4_get_inode_loc+0x45a/0x13d0 [ 2718.179337] ? jbd2_write_access_granted.part.9+0x274/0x430 [ 2718.185031] ? jbd2_journal_file_inode+0x690/0x690 [ 2718.189945] ? rcu_note_context_switch+0x730/0x730 [ 2718.194859] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2718.200392] ? jbd2_journal_get_write_access+0xa5/0xc0 [ 2718.205656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2718.211178] ? ext4_xattr_ibody_set+0x1ec/0x2c0 [ 2718.215836] ext4_xattr_set_handle+0xfea/0x1660 [ 2718.220495] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 2718.225758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2718.231280] ? ext4_xattr_set+0x1f4/0x420 [ 2718.235597] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 2718.241293] ? up_read+0x1a/0x110 [ 2718.244727] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 2718.250160] ext4_xattr_set+0x245/0x420 [ 2718.254121] ? ext4_xattr_set_credits+0x120/0x120 [ 2718.258947] ? lock_acquire+0x1e4/0x540 [ 2718.262914] ? vfs_setxattr+0x96/0x100 [ 2718.266784] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 2718.271784] ext4_xattr_security_set+0x36/0x40 [ 2718.276347] ? ext4_initxattrs+0x120/0x120 [ 2718.280564] __vfs_setxattr+0x124/0x190 [ 2718.284522] ? xattr_resolve_name+0x430/0x430 [ 2718.289000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2718.294523] ? ns_capable_common+0x13f/0x170 [ 2718.298913] ? ns_capable+0x22/0x30 [ 2718.302521] __vfs_setxattr_noperm+0x11d/0x410 [ 2718.307089] vfs_setxattr+0xd8/0x100 [ 2718.310785] setxattr+0x2ea/0x450 [ 2718.314220] ? vfs_setxattr+0x100/0x100 [ 2718.318179] ? lock_acquire+0x1e4/0x540 [ 2718.322138] ? mnt_want_write+0x3f/0xc0 [ 2718.326096] ? lock_release+0xa30/0xa30 [ 2718.330050] ? check_same_owner+0x340/0x340 [ 2718.334356] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2718.339875] ? __mnt_want_write+0x2f9/0x3e0 [ 2718.344186] ? may_umount_tree+0x220/0x220 [ 2718.348406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2718.353931] ? __sb_start_write+0x17f/0x300 [ 2718.358234] path_setxattr+0x1e3/0x230 [ 2718.362104] ? setxattr+0x450/0x450 [ 2718.365715] __x64_sys_lsetxattr+0xc1/0x150 [ 2718.370025] do_syscall_64+0x1b9/0x820 [ 2718.373893] ? finish_task_switch+0x1d3/0x870 [ 2718.378374] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2718.383299] ? syscall_return_slowpath+0x31d/0x5e0 [ 2718.388212] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2718.393209] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2718.398209] ? perf_trace_sys_enter+0xb10/0xb10 [ 2718.402874] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2718.407702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2718.412872] RIP: 0033:0x455ba9 [ 2718.416039] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2718.435208] RSP: 002b:00007fc2ebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2718.442897] RAX: ffffffffffffffda RBX: 00007fc2ebe026d4 RCX: 0000000000455ba9 [ 2718.450149] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000020000040 [ 2718.457400] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2718.464649] R10: 000000000000013e R11: 0000000000000246 R12: 0000000000000013 [ 2718.471900] R13: 00000000004c01cc R14: 00000000004cf820 R15: 0000000000000003 00:46:45 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x80350000]}) 00:46:45 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300e2a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:45 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:45 executing program 5 (fault-call:2 fault-nth:4): stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:45 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2a, 0x3) unlink(&(0x7f0000000000)='./file0\x00') 00:46:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:45 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300caa31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2718.561259] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2718.589389] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value [ 2718.605529] FAULT_INJECTION: forcing a failure. [ 2718.605529] name failslab, interval 1, probability 0, space 0, times 0 [ 2718.616827] CPU: 1 PID: 30900 Comm: syz-executor5 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2718.625232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2718.634581] Call Trace: [ 2718.637169] dump_stack+0x1c9/0x2b4 [ 2718.640802] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2718.646000] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 2718.650594] should_fail.cold.4+0xa/0x11 [ 2718.654673] ? fault_create_debugfs_attr+0x1f0/0x1f0 00:46:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:45 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000140)='./file0\x00') [ 2718.659782] ? get_page_from_freelist+0x3c2d/0x4620 [ 2718.664806] ? lock_release+0xa30/0xa30 [ 2718.668786] ? __wake_up_common_lock+0x1d0/0x330 [ 2718.673554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2718.679101] ? trace_hardirqs_on+0x10/0x10 [ 2718.683343] ? __find_get_block+0x36d/0xe60 [ 2718.687675] ? iput+0x63a/0xaa0 [ 2718.690965] ? inode_add_lru+0x2a0/0x2a0 [ 2718.695031] ? lock_release+0xa30/0xa30 [ 2718.699006] ? trace_hardirqs_on+0x10/0x10 [ 2718.703249] ? rcu_is_watching+0x8c/0x150 [ 2718.707402] ? check_same_owner+0x340/0x340 00:46:45 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530f0", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2718.711727] ? rcu_note_context_switch+0x730/0x730 [ 2718.716669] __should_failslab+0x124/0x180 [ 2718.720911] should_failslab+0x9/0x14 [ 2718.724716] __kmalloc+0x2c8/0x760 [ 2718.728259] ? start_this_handle+0x589/0x1260 [ 2718.732760] ? ext4_xattr_block_set+0xaae/0x44d0 [ 2718.737526] ext4_xattr_block_set+0xaae/0x44d0 [ 2718.742116] ? ext4_xattr_inode_get+0xa20/0xa20 [ 2718.746793] ? lock_downgrade+0x8f0/0x8f0 [ 2718.750946] ? ext4_xattr_ibody_set+0x2c0/0x2c0 [ 2718.755619] ? jbd2_journal_free_reserved+0x110/0x110 00:46:45 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301fba31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:45 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2a, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:45 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2718.760815] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2718.765837] ? ext4_get_group_desc+0x1cd/0x2d0 [ 2718.770428] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2718.775973] ? __ext4_get_inode_loc+0x45a/0x13d0 [ 2718.780735] ? jbd2_write_access_granted.part.9+0x274/0x430 [ 2718.786453] ? jbd2_journal_file_inode+0x690/0x690 [ 2718.791384] ? rcu_note_context_switch+0x730/0x730 [ 2718.796320] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2718.801861] ? jbd2_journal_get_write_access+0xa5/0xc0 [ 2718.807148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2718.812712] ? ext4_xattr_ibody_set+0x1ec/0x2c0 [ 2718.817384] ext4_xattr_set_handle+0xfea/0x1660 [ 2718.822055] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 2718.827340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2718.832880] ? ext4_xattr_set+0x1f4/0x420 [ 2718.837028] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 2718.842740] ? up_read+0x1a/0x110 [ 2718.846197] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 2718.851663] ext4_xattr_set+0x245/0x420 [ 2718.855652] ? ext4_xattr_set_credits+0x120/0x120 [ 2718.860498] ? lock_acquire+0x1e4/0x540 [ 2718.864470] ? vfs_setxattr+0x96/0x100 [ 2718.868358] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 2718.873379] ext4_xattr_security_set+0x36/0x40 [ 2718.877956] ? ext4_initxattrs+0x120/0x120 [ 2718.882172] __vfs_setxattr+0x124/0x190 [ 2718.886127] ? xattr_resolve_name+0x430/0x430 [ 2718.890613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2718.896141] ? ns_capable_common+0x13f/0x170 [ 2718.900541] ? ns_capable+0x22/0x30 [ 2718.904151] __vfs_setxattr_noperm+0x11d/0x410 [ 2718.908712] vfs_setxattr+0xd8/0x100 [ 2718.912415] setxattr+0x2ea/0x450 [ 2718.915850] ? vfs_setxattr+0x100/0x100 [ 2718.919807] ? lock_acquire+0x1e4/0x540 [ 2718.923761] ? mnt_want_write+0x3f/0xc0 [ 2718.927716] ? lock_release+0xa30/0xa30 [ 2718.931669] ? check_same_owner+0x340/0x340 [ 2718.935986] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2718.941507] ? __mnt_want_write+0x2f9/0x3e0 [ 2718.945811] ? may_umount_tree+0x220/0x220 [ 2718.950047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2718.955565] ? __sb_start_write+0x17f/0x300 [ 2718.959866] path_setxattr+0x1e3/0x230 [ 2718.963734] ? setxattr+0x450/0x450 [ 2718.967341] __x64_sys_lsetxattr+0xc1/0x150 [ 2718.971647] do_syscall_64+0x1b9/0x820 [ 2718.975514] ? finish_task_switch+0x1d3/0x870 [ 2718.979992] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2718.984917] ? syscall_return_slowpath+0x31d/0x5e0 [ 2718.989839] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2718.994844] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2718.999841] ? perf_trace_sys_enter+0xb10/0xb10 [ 2719.004493] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2719.009323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2719.014491] RIP: 0033:0x455ba9 [ 2719.017670] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2719.036790] RSP: 002b:00007fc2ebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2719.044492] RAX: ffffffffffffffda RBX: 00007fc2ebe026d4 RCX: 0000000000455ba9 [ 2719.051747] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000020000040 00:46:46 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x3a000000]}) 00:46:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:46 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0x2, &(0x7f00000001c0)=""/194, &(0x7f0000000140)=0xc2) 00:46:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:46 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:46 executing program 5 (fault-call:2 fault-nth:5): stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2719.059006] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2719.066267] R10: 000000000000013e R11: 0000000000000246 R12: 0000000000000013 [ 2719.073521] R13: 00000000004c01cc R14: 00000000004cf820 R15: 0000000000000004 [ 2719.118182] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2719.153984] FAULT_INJECTION: forcing a failure. [ 2719.153984] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:46:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000ff00", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2719.165843] CPU: 1 PID: 30949 Comm: syz-executor5 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2719.174248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2719.183608] Call Trace: [ 2719.186214] dump_stack+0x1c9/0x2b4 [ 2719.189859] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2719.195067] should_fail.cold.4+0xa/0x11 [ 2719.199134] ? kasan_kmalloc+0xc4/0xe0 [ 2719.203032] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2719.208227] ? path_openat+0x246e/0x5620 [ 2719.212294] ? do_filp_open+0x255/0x380 00:46:46 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) [ 2719.216274] ? do_sys_open+0x584/0x720 [ 2719.220167] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2719.225710] ? mark_page_accessed+0x672/0xd30 [ 2719.230209] ? activate_page+0x9a0/0x9a0 [ 2719.234276] ? kasan_check_write+0x14/0x20 [ 2719.238514] ? prep_compound_page+0x231/0x380 [ 2719.242448] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2719.243016] ? set_pageblock_migratetype+0x40/0x40 [ 2719.255573] ? lock_release+0xa30/0xa30 [ 2719.259553] ? kasan_check_read+0x11/0x20 [ 2719.263705] ? do_raw_spin_trylock+0x1c0/0x1c0 00:46:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000ff00", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2719.268290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2719.273832] ? should_fail+0x246/0xd86 [ 2719.277720] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2719.282832] ? get_page_from_freelist+0x3c2d/0x4620 [ 2719.287847] ? lock_release+0xa30/0xa30 [ 2719.291823] __alloc_pages_nodemask+0x36e/0xdb0 [ 2719.296497] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 2719.301518] ? __find_get_block+0x36d/0xe60 [ 2719.305840] ? iput+0x63a/0xaa0 [ 2719.309122] ? inode_add_lru+0x2a0/0x2a0 [ 2719.313187] ? lock_release+0xa30/0xa30 00:46:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2719.317164] ? trace_hardirqs_on+0x10/0x10 [ 2719.321403] ? rcu_is_watching+0x8c/0x150 [ 2719.325552] ? check_same_owner+0x340/0x340 [ 2719.329881] cache_grow_begin+0x91/0x710 [ 2719.333953] __kmalloc+0x688/0x760 [ 2719.337496] ? start_this_handle+0x589/0x1260 [ 2719.341994] ? ext4_xattr_block_set+0xaae/0x44d0 [ 2719.344578] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2719.346750] ext4_xattr_block_set+0xaae/0x44d0 [ 2719.346768] ? ext4_xattr_inode_get+0xa20/0xa20 [ 2719.346791] ? lock_downgrade+0x8f0/0x8f0 [ 2719.367767] ? ext4_xattr_ibody_set+0x2c0/0x2c0 [ 2719.372444] ? jbd2_journal_free_reserved+0x110/0x110 [ 2719.377641] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2719.382659] ? ext4_get_group_desc+0x1cd/0x2d0 [ 2719.387250] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2719.392782] ? __ext4_get_inode_loc+0x45a/0x13d0 [ 2719.397527] ? jbd2_write_access_granted.part.9+0x274/0x430 [ 2719.403227] ? jbd2_journal_file_inode+0x690/0x690 [ 2719.408144] ? rcu_note_context_switch+0x730/0x730 [ 2719.413063] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2719.418587] ? jbd2_journal_get_write_access+0xa5/0xc0 [ 2719.423852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2719.429373] ? ext4_xattr_ibody_set+0x1ec/0x2c0 [ 2719.434027] ext4_xattr_set_handle+0xfea/0x1660 [ 2719.438684] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 2719.443959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2719.449479] ? ext4_xattr_set+0x1f4/0x420 [ 2719.453614] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 2719.459311] ? up_read+0x1a/0x110 [ 2719.462746] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 2719.468181] ext4_xattr_set+0x245/0x420 [ 2719.472145] ? ext4_xattr_set_credits+0x120/0x120 [ 2719.476974] ? lock_acquire+0x1e4/0x540 [ 2719.480928] ? vfs_setxattr+0x96/0x100 [ 2719.484799] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 2719.489800] ext4_xattr_security_set+0x36/0x40 [ 2719.494364] ? ext4_initxattrs+0x120/0x120 [ 2719.498581] __vfs_setxattr+0x124/0x190 [ 2719.502546] ? xattr_resolve_name+0x430/0x430 [ 2719.507049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2719.512569] ? ns_capable_common+0x13f/0x170 [ 2719.516969] ? ns_capable+0x22/0x30 [ 2719.520578] __vfs_setxattr_noperm+0x11d/0x410 [ 2719.525146] vfs_setxattr+0xd8/0x100 [ 2719.528842] setxattr+0x2ea/0x450 [ 2719.532278] ? vfs_setxattr+0x100/0x100 [ 2719.536234] ? lock_acquire+0x1e4/0x540 [ 2719.540189] ? mnt_want_write+0x3f/0xc0 [ 2719.544147] ? lock_release+0xa30/0xa30 [ 2719.548107] ? check_same_owner+0x340/0x340 [ 2719.552411] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2719.557942] ? __mnt_want_write+0x2f9/0x3e0 [ 2719.562259] ? may_umount_tree+0x220/0x220 [ 2719.566477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2719.572006] ? __sb_start_write+0x17f/0x300 [ 2719.576320] path_setxattr+0x1e3/0x230 [ 2719.580192] ? setxattr+0x450/0x450 [ 2719.583816] ? syscall_slow_exit_work+0x500/0x500 [ 2719.588643] __x64_sys_lsetxattr+0xc1/0x150 [ 2719.592948] do_syscall_64+0x1b9/0x820 [ 2719.596826] ? finish_task_switch+0x1d3/0x870 [ 2719.601303] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2719.606214] ? syscall_return_slowpath+0x31d/0x5e0 [ 2719.611129] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2719.616129] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2719.621131] ? perf_trace_sys_enter+0xb10/0xb10 [ 2719.625785] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2719.630615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2719.635785] RIP: 0033:0x455ba9 [ 2719.638953] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2719.658126] RSP: 002b:00007fc2ebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd 00:46:46 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece033c01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:46 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2719.665818] RAX: ffffffffffffffda RBX: 00007fc2ebe026d4 RCX: 0000000000455ba9 [ 2719.673074] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000020000040 [ 2719.680339] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2719.687594] R10: 000000000000013e R11: 0000000000000246 R12: 0000000000000013 [ 2719.694855] R13: 00000000004c01cc R14: 00000000004cf820 R15: 0000000000000005 00:46:46 executing program 5 (fault-call:2 fault-nth:6): stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2719.729714] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value [ 2719.804322] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2719.813260] FAULT_INJECTION: forcing a failure. [ 2719.813260] name failslab, interval 1, probability 0, space 0, times 0 [ 2719.824526] CPU: 1 PID: 30993 Comm: syz-executor5 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2719.832935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2719.842285] Call Trace: [ 2719.844883] dump_stack+0x1c9/0x2b4 [ 2719.848523] ? dump_stack_print_info.cold.2+0x52/0x52 00:46:47 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0xf000]}) 00:46:47 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x10) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000001c0)=0x14, 0x800) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x400000, 0x0) bind$xdp(r0, &(0x7f0000000240)={0x2c, 0x2, r1, 0x20, r2}, 0x10) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2719.853723] should_fail.cold.4+0xa/0x11 [ 2719.857793] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2719.862907] ? kasan_check_write+0x14/0x20 [ 2719.867147] ? __brelse+0x104/0x180 [ 2719.870777] ? block_commit_write+0x30/0x30 [ 2719.875104] ? kasan_check_write+0x14/0x20 [ 2719.879343] ? do_raw_spin_lock+0xc1/0x200 [ 2719.883590] ? __find_get_block+0x36d/0xe60 [ 2719.887920] ? block_invalidatepage+0x520/0x520 [ 2719.892599] ? check_same_owner+0x340/0x340 [ 2719.896927] ? check_same_owner+0x340/0x340 [ 2719.901254] ? rcu_note_context_switch+0x730/0x730 [ 2719.906191] __should_failslab+0x124/0x180 [ 2719.910431] should_failslab+0x9/0x14 [ 2719.914237] kmem_cache_alloc+0x2af/0x760 [ 2719.918393] ? __find_get_block+0xe60/0xe60 [ 2719.922715] jbd2_journal_add_journal_head+0x1ef/0x5d0 [ 2719.927988] ? jbd2_journal_write_metadata_buffer+0xf00/0xf00 [ 2719.933871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2719.939413] jbd2_journal_get_create_access+0x42/0x600 [ 2719.944692] ? rcu_note_context_switch+0x730/0x730 [ 2719.949620] __ext4_journal_get_create_access+0x46/0x90 [ 2719.954981] ext4_xattr_block_set+0x1d19/0x44d0 [ 2719.959639] ? ext4_xattr_ibody_set+0x2c0/0x2c0 [ 2719.964292] ? jbd2_journal_free_reserved+0x110/0x110 [ 2719.969491] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2719.974505] ? ext4_get_group_desc+0x1cd/0x2d0 [ 2719.979073] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2719.984593] ? __ext4_get_inode_loc+0x45a/0x13d0 [ 2719.989333] ? jbd2_write_access_granted.part.9+0x274/0x430 [ 2719.995034] ? jbd2_journal_file_inode+0x690/0x690 [ 2719.999947] ? rcu_note_context_switch+0x730/0x730 [ 2720.005136] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2720.010655] ? jbd2_journal_get_write_access+0xa5/0xc0 [ 2720.015929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.021450] ? ext4_xattr_ibody_set+0x1ec/0x2c0 [ 2720.026101] ext4_xattr_set_handle+0xfea/0x1660 [ 2720.030768] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 2720.036042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.041574] ? ext4_xattr_set+0x1f4/0x420 [ 2720.045702] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 2720.051398] ? up_read+0x1a/0x110 [ 2720.054833] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 2720.060262] ext4_xattr_set+0x245/0x420 [ 2720.064220] ? ext4_xattr_set_credits+0x120/0x120 [ 2720.069053] ? lock_acquire+0x1e4/0x540 [ 2720.073018] ? vfs_setxattr+0x96/0x100 [ 2720.076900] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 2720.081899] ext4_xattr_security_set+0x36/0x40 [ 2720.086461] ? ext4_initxattrs+0x120/0x120 [ 2720.090680] __vfs_setxattr+0x124/0x190 [ 2720.094637] ? xattr_resolve_name+0x430/0x430 [ 2720.099116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.104634] ? ns_capable_common+0x13f/0x170 [ 2720.109034] ? ns_capable+0x22/0x30 [ 2720.112652] __vfs_setxattr_noperm+0x11d/0x410 [ 2720.117229] vfs_setxattr+0xd8/0x100 [ 2720.120941] setxattr+0x2ea/0x450 [ 2720.124375] ? vfs_setxattr+0x100/0x100 [ 2720.128337] ? lock_acquire+0x1e4/0x540 [ 2720.132291] ? mnt_want_write+0x3f/0xc0 [ 2720.136250] ? lock_release+0xa30/0xa30 [ 2720.140203] ? check_same_owner+0x340/0x340 [ 2720.144506] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2720.150031] ? __mnt_want_write+0x2f9/0x3e0 [ 2720.154336] ? may_umount_tree+0x220/0x220 [ 2720.158557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.164075] ? __sb_start_write+0x17f/0x300 [ 2720.168377] path_setxattr+0x1e3/0x230 [ 2720.172242] ? setxattr+0x450/0x450 [ 2720.175852] ? syscall_slow_exit_work+0x500/0x500 [ 2720.180675] __x64_sys_lsetxattr+0xc1/0x150 [ 2720.184996] do_syscall_64+0x1b9/0x820 [ 2720.188867] ? finish_task_switch+0x1d3/0x870 [ 2720.193345] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2720.198257] ? syscall_return_slowpath+0x31d/0x5e0 [ 2720.203170] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2720.208172] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2720.213173] ? perf_trace_sys_enter+0xb10/0xb10 [ 2720.217822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2720.222649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2720.227820] RIP: 0033:0x455ba9 [ 2720.230987] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2720.250181] RSP: 002b:00007fc2ebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2720.257870] RAX: ffffffffffffffda RBX: 00007fc2ebe026d4 RCX: 0000000000455ba9 [ 2720.265120] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000020000040 [ 2720.272373] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2720.279635] R10: 000000000000013e R11: 0000000000000246 R12: 0000000000000013 [ 2720.286882] R13: 00000000004c01cc R14: 00000000004cf820 R15: 0000000000000006 [ 2720.294328] ENOMEM in journal_alloc_journal_head, retrying. 00:46:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c65301c", 0x0) 00:46:47 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece038201a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:47 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530e0", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:47 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @loopback=0x7f000001}}, [0xfffffffffffffffd, 0x4, 0x7, 0x7, 0x7, 0x2, 0x100000000, 0x3c4, 0x4, 0x40, 0x6, 0xff, 0x0, 0x0, 0x49d29b31]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000380)={r1, 0x1}, 0x8) unlink(&(0x7f0000000000)='./file0\x00') unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0xc6d1, 0x4000) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) 00:46:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0xffffff8d}], 0x1, 0x0, 0x0) 00:46:47 executing program 5 (fault-call:2 fault-nth:7): stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:47 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x806]}) [ 2720.333153] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2720.395174] FAULT_INJECTION: forcing a failure. [ 2720.395174] name failslab, interval 1, probability 0, space 0, times 0 [ 2720.406486] CPU: 1 PID: 31030 Comm: syz-executor5 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2720.414897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2720.424250] Call Trace: [ 2720.426846] dump_stack+0x1c9/0x2b4 [ 2720.430482] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2720.435689] should_fail.cold.4+0xa/0x11 [ 2720.439762] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2720.444872] ? kasan_check_write+0x14/0x20 [ 2720.449110] ? __brelse+0x104/0x180 [ 2720.452743] ? block_commit_write+0x30/0x30 [ 2720.459153] ? kasan_check_write+0x14/0x20 [ 2720.463394] ? do_raw_spin_lock+0xc1/0x200 [ 2720.467637] ? __find_get_block+0x36d/0xe60 [ 2720.471985] ? block_invalidatepage+0x520/0x520 [ 2720.476666] ? check_same_owner+0x340/0x340 [ 2720.480995] ? check_same_owner+0x340/0x340 [ 2720.485323] ? rcu_note_context_switch+0x730/0x730 [ 2720.490259] __should_failslab+0x124/0x180 [ 2720.494499] should_failslab+0x9/0x14 [ 2720.498307] kmem_cache_alloc+0x2af/0x760 [ 2720.502461] ? __find_get_block+0xe60/0xe60 [ 2720.506784] jbd2_journal_add_journal_head+0x1ef/0x5d0 [ 2720.512068] ? kasan_check_write+0x14/0x20 [ 2720.516309] ? jbd2_journal_write_metadata_buffer+0xf00/0xf00 [ 2720.522205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.527750] jbd2_journal_get_create_access+0x42/0x600 [ 2720.533030] ? rcu_note_context_switch+0x730/0x730 [ 2720.537969] __ext4_journal_get_create_access+0x46/0x90 00:46:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0xfffffff0}], 0x1, 0x0, 0x0) 00:46:47 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece039100a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:47 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:47 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:47 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0(', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530ff", 0x0) 00:46:47 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653002", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2720.543337] ext4_xattr_block_set+0x1d19/0x44d0 [ 2720.548021] ? ext4_xattr_ibody_set+0x2c0/0x2c0 [ 2720.552700] ? jbd2_journal_free_reserved+0x110/0x110 [ 2720.557893] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2720.562925] ? ext4_get_group_desc+0x1cd/0x2d0 [ 2720.567519] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2720.573060] ? __ext4_get_inode_loc+0x45a/0x13d0 [ 2720.577825] ? jbd2_write_access_granted.part.9+0x274/0x430 [ 2720.583540] ? jbd2_journal_file_inode+0x690/0x690 [ 2720.588467] ? rcu_note_context_switch+0x730/0x730 00:46:47 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:47 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2720.593403] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2720.598941] ? jbd2_journal_get_write_access+0xa5/0xc0 [ 2720.604227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.609763] ? ext4_xattr_ibody_set+0x1ec/0x2c0 [ 2720.614437] ext4_xattr_set_handle+0xfea/0x1660 [ 2720.619117] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 2720.624399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.629939] ? ext4_xattr_set+0x1f4/0x420 [ 2720.634085] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 2720.639799] ? up_read+0x1a/0x110 00:46:47 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece031e01a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2720.643256] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 2720.648707] ext4_xattr_set+0x245/0x420 [ 2720.652685] ? ext4_xattr_set_credits+0x120/0x120 [ 2720.655074] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2720.657529] ? lock_acquire+0x1e4/0x540 [ 2720.657539] ? vfs_setxattr+0x96/0x100 [ 2720.657558] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 2720.678001] ext4_xattr_security_set+0x36/0x40 [ 2720.682586] ? ext4_initxattrs+0x120/0x120 [ 2720.686826] __vfs_setxattr+0x124/0x190 [ 2720.690801] ? xattr_resolve_name+0x430/0x430 00:46:47 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030037a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:47 executing program 0: symlink(&(0x7f00000002c0)='./file1\x00', &(0x7f00000003c0)='./file2\x00') r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000200)='./file0\x00') r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x80400, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000140)=0x40000) [ 2720.695297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.700834] ? ns_capable_common+0x13f/0x170 [ 2720.705243] ? ns_capable+0x22/0x30 [ 2720.708872] __vfs_setxattr_noperm+0x11d/0x410 [ 2720.713457] vfs_setxattr+0xd8/0x100 [ 2720.717176] setxattr+0x2ea/0x450 [ 2720.720633] ? vfs_setxattr+0x100/0x100 [ 2720.724610] ? lock_acquire+0x1e4/0x540 [ 2720.728587] ? mnt_want_write+0x3f/0xc0 [ 2720.732563] ? lock_release+0xa30/0xa30 [ 2720.736541] ? check_same_owner+0x340/0x340 [ 2720.738826] nla_parse: 4 callbacks suppressed [ 2720.738833] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2720.740864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2720.740880] ? __mnt_want_write+0x2f9/0x3e0 [ 2720.740896] ? may_umount_tree+0x220/0x220 [ 2720.740909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.740927] ? __sb_start_write+0x17f/0x300 [ 2720.745464] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2720.753790] path_setxattr+0x1e3/0x230 [ 2720.753803] ? setxattr+0x450/0x450 [ 2720.753819] __x64_sys_lsetxattr+0xc1/0x150 [ 2720.762861] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2720.763645] do_syscall_64+0x1b9/0x820 [ 2720.763660] ? finish_task_switch+0x1d3/0x870 [ 2720.763676] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2720.763695] ? syscall_return_slowpath+0x31d/0x5e0 [ 2720.823682] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2720.828704] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2720.833727] ? perf_trace_sys_enter+0xb10/0xb10 [ 2720.838397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2720.843242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2720.848425] RIP: 0033:0x455ba9 [ 2720.851603] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2720.870868] RSP: 002b:00007fc2ebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2720.878591] RAX: ffffffffffffffda RBX: 00007fc2ebe026d4 RCX: 0000000000455ba9 [ 2720.885842] RDX: 00000000200000c0 RSI: 0000000020000100 RDI: 0000000020000040 00:46:48 executing program 5 (fault-call:2 fault-nth:8): stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000200", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:48 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece031700a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:48 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x2}], 0x1, 0x0, 0x0) 00:46:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x8864]}) [ 2720.893100] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2720.900351] R10: 000000000000013e R11: 0000000000000246 R12: 0000000000000013 [ 2720.907598] R13: 00000000004c01cc R14: 00000000004cf820 R15: 0000000000000007 [ 2720.915127] ENOMEM in journal_alloc_journal_head, retrying. 00:46:48 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece033201a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:48 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x18000, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000340)={0x7fff, 0xe, 0xffffffff, 0x2000000000000000, "4f316562da2c04f4617c9b2157f1621477b92bbfd9e84584fb2b8d3f5bb76abe"}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x109000, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xc0, &(0x7f0000000240)="d0cbc2a9d37309b710ef90e6a34bc75432112c88e11f6adf308cb9e22de22e5025a236b838cf93b76f98ad9a0e939d9b86fd648cde640c8de330cc5275b7f45e21a6f15b264eda3741872cb579c6c14ed729b2ef34ad4b9688c8bbb2d0d6cf5e39385b98dca9f42bfd95f20eb86cfdb3ebc1fe0ad399b64d", 0x78) getpeername$packet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}, 0x54, r2}) [ 2720.956060] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\v', 0x0) 00:46:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x7}], 0x1, 0x0, 0x0) 00:46:48 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:48 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x3580]}) 00:46:48 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03f000a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:48 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x8, 0x10000) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) ioctl$RTC_WIE_OFF(r0, 0x7010) unlink(&(0x7f0000000140)='./file0\x00') 00:46:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x1000000000000000}], 0x1, 0x0, 0x0) 00:46:48 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='//file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:48 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530e0", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2721.123419] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:48 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece034a00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x84ffffff]}) 00:46:48 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='./file0\x00') syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="bbfaaaa36c593b9dca390168b78c509fda77927f5106e94c5a174ec165d4a6dca952ee63e0058d17b4be2dfb7f6c0e9e240819f1eab72f2ddb402dd6700d72f87658f67dfe7d29c2cd1094a28f8f43c6ce2e50c32d33077d3926751892ad9443321b05", 0x63, 0x6b5}, {&(0x7f0000000280)="965ef5503621eb31fa6ad055fb500b7165c6fb57bd95eb8ea5e0753d4b9aa7ca5089199c440e42cbe37a87d7ab41e06d25aa", 0x32, 0x800000000000}], 0x2000000, &(0x7f0000000300)={[{@errors_remount='errors=remount-ro', 0x2c}, {@errors_recover='errors=recover', 0x2c}, {@errors_remount='errors=remount-ro', 0x2c}, {@uid={'uid', 0x3d}, 0x2c}, {@errors_remount='errors=remount-ro', 0x2c}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, [0x33]}, 0x2c}, {@case_sensitive_yes={'case_sensitive=yes', 0x3d, [0x33, 0x39, 0x0, 0x78, 0x37, 0x33, 0x32]}, 0x2c}, {@dmask={'dmask', 0x3d, [0x31, 0x36, 0x35, 0x32, 0x30, 0x35, 0x37, 0x30]}, 0x2c}, {@umask={'umask', 0x3d, [0x31, 0x31, 0x34]}, 0x2c}]}) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000100", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x3}], 0x1, 0x0, 0x0) 00:46:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c653010", 0x0) 00:46:48 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece033e01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:48 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='.//ile0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:48 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:48 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x6000000]}) [ 2721.306784] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:48 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./.ile0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:48 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:48 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03015ba31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x8dffffff}], 0x1, 0x0, 0x0) 00:46:48 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') unlink(&(0x7f0000000000)='./file0\x00') 00:46:48 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./fily0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:48 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c653093", 0x0) [ 2721.459444] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x1000000]}) 00:46:48 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece037a00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0xf0ffffff}], 0x1, 0x0, 0x0) 00:46:48 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x3, 0x400000) sendmmsg(r0, &(0x7f0000005c80)=[{{&(0x7f0000000440)=@ipx={0x4, 0x8, 0x5, "4b18a618a7f8", 0x2}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000004c0)="7455b577017911e3282af8b768b1f2ed8f802a9edca4bd688359defd7955447d19b8b3e01888fa5a1791e754ba47751ddaaf8bbf44cb60b28a9f8e54939f0e2610e163c3294eff0919246f36865a13cb6638a0c0cfa15b", 0x57}, {&(0x7f0000000540)="cabd1b763420829aec5a79953eec4babeddf21882ff618cd5ab97fa52c139d0ca3f4b1ba8706ef2e875b1876acb37f3e7b4a7610d0b3bf0a49e82781ca3d61a776a1f649775838ac4a5ca3409148c4a289a8c72ec709f177acc9f96aa35b5294e4700ae0105d455cbe8fb5681fe42be4643a5ebeeb1e6f423d1c90fdd88dbc4ae579c1d9a3b363c1728f0babb0595cb8eef7b00ecc35a297e8439775b0e6163d5de3654379e0a79635c2021947f7dbd52c2025a0a32c85e921e9f9aa1c7fc64cc5e3c8a5", 0xc4}, {&(0x7f0000000640)="2584ed767bd5fe90ee62ee2a33f9c961b5e3dfb40b9eae738800f70625a055ef406e64c92804530e2c9504276600d5807b4bbb62ed7cd2cae06134cd9c256f02db536e2e60ccdbf12bc19c493b45333ff680d828591ebd5a8f816492f96282c2bb785574dc898cc09f322bfa1df94604d9f7026255c84e60751448fdaf285e9bca07d9b5750b7c634846daa7511aa08406366e74dc83b9ab567447dca37184d6d26d0d76f74cb0b29ab06b585f869a275ebfd258e420d58e397773d52501e39b02a978dd85167a9e84d73ada97bf31ada8b472f0cb32b1d7dd2dd233e0c016ee90c92e97eb4924d9714bab73bac21f1d12e6abc2", 0xf4}, {&(0x7f0000000740)="c6da552ce690f4f64f8196fb9d766f9803865fb3f6eac94e0d25f9a6f2751ebb41ccc6b6e521b53bc6f03c8682df0bfb37ed5342a36d6f71a55b95beaab0e2ce1cfb06453d6ba41e6d2cf4d0013264668eb6f30b", 0x54}], 0x4, &(0x7f0000000800)=[{0x1010, 0x0, 0xdf26, "85a09ac29189b058af33b941e11818722068b94d41d8a09d6b0415b9a8e93e4a3fc0808dbd076d15bb5ac68ca3c7587a9a837e830a3b290202a79a85176730281304f61e863b231ff391e70a1b70045743546964d3679ca42d278c1c24604dbf3da41c12e78c8956e61bebce91d355ccb5c2e9e5f6b4a3a54b91a05e5054dc45fb7931240e186a5af21015315d7a757a66d59a61a8c907663c9228028fa4776d56bbb653ca206579d075612b8939f1beb966444fdf15bec3d4182d744725c0d1452db8c36d0171e66b35fe21ce149d85b5ad962f8270688825c91a55bce24e2bb02508b0e8514df1ca81adca29c6f8d13366630c484af21616bafbdd81e55502b8ef229119423de17fd1f8e30a9478a663afd3938cf23f9438633e57ef54a1186a278e5aa230180e01352c190cb615d44f662780633d83b9d01e47425e6ea8b9ae6720a4f30d177c70310866600892f2c45c403b51c532a3f81cea06c875ff85bbd54dcce7962315f9a10315a9e4ff80ea37c21659ec6680584870b31cf1496915b2711243917fab7f0107abdab49c231fa3cb4cc5931fa1c867ed99ea08d1eac242790ce67e9c7574b38974b2413e27d9ae1b3ceef27e254b28598200177269328e8c45337a17673cb19e44eee5aa980b20c477f51baa25595c0130d2a5f1cb58e88e5646710032b6bdb5637a95539ad623dfcbcf0564339d8deb0290031b25b8c45a595bc9e1edb38c2993e1074508f9a2b8719f3f3be3d3f5efb324d65b2e8c84650e597d2fc616186f398fdda7e4bcd796ff00fdc6d7b9b117fb3508bd5a12ba0a45ed8f3154ba0382aed11561b3139a9d6dbc519f72fa7e3d0cf0a47d17925f1fd2c5021ee2d7b15ecb1ee0e71fee74228ea487338f1a0e5aabffe82f3f406ac57f1dc60122db1fd5137b756ce3ec94367c4e6c93815219861e130adcaf2815c15187e8b31232b071080aef5f143e2ba74d748222c99c00d0add500007cccf5c003c97848654036f6ea5555e4282b1c7382fad62063f9dc10ee98cb2aa5113c44d3905f759d366f8d5eab481f58a1f24a361f4dd73dc4debf4408f103aa568c77aaeb357f34a9ffb9743b81c2d58bfd143a6e1a8db506e10071b8a1d98b35b16625721026a719d116bdc8c25c11db23b4e77ec206558f306d2c1bdd095809c5877e514def9158677b40c22edaf0c175c75290dfa5480eb5e1039326171aa3362bb6b0f9331f44f26247a1694be0c665f2acc40596574615094e20c0f951477ccfc4bebc9635c44628676114bc7ea568ea28bca17fd24023613381232f1a4a0c382a8965e904b35a80e727a5fda10c68511317ba8cab2f1db6397e09751bea8bf78ee397981c6b9f167992d480eab38e0c19ef30f8a0adb0ea13dc9fbff9da9d2eb71379819f640188eaa235ef4a49dd880966af003e04230978677c32e19b1afe30b5bbc24bf14e5372854719dc5871c9659c6a5acb5d0281b98caeebf463184347b58682c967a425ef576239e4abf9295b401c357f031a02e963b98db4f96979fa587ff4bc124594e7c16f78df7be9905784b5818c1f43690b43de5392b41bcf221c71cd59d53849c20bd92e11bd5ca7cbf6ecdd061433a6861efd97d8652b744c29f4cbac6fb54f982bc8a4b529dd7ccfc2859350e6db425e701e6fce39b0add8b8eef53ad5c2d13349e3d743b5e77af57b28d7e382f067708ca4bd90002c3a1715359c635d8de9d51a662963900d199c161727b22bc64b1661c113c154780e2ae0f052d4bf82c465894882ac8d11197c24a7fbd4b9ea209bf57fe417600b2e10f11ac233ef762c1367c791710d426772b3d7855f4cc1fb287286c3e6d2197493dde5cf9a0254edd70f70d61610d79a3d1ed5e97ca67793bdbb82084b21efcdb9bbb6ba6cef9179ad3183112ea744a099482fbcb99bd2899dd9c51ace6cf2947c8c03ea2a8bd8b8a48d05b3df8fc9563e3ca927d43ad5a90163e46463c323821adb1c93f6d82bf16f487a0e73fb1a13f20f2f4a5bdddce26b763420ae7ab05bcd1cb116ecb7621c048c4a0f304400023db75e3603f0b6c5645960fd7a79e19e2befae481bd6e53809d9d78584f5f3d8ff1dab8ce27966db099613b870e05fd2d858ad4cebf9532eac2a1e40b9293fa1cacb60c292f721b64588b863cdb9c63ba2e20dabae2f39d14741f320f180b21e45ca7dc5f150a5afaa1ddce27bfd05d14b0a4bf4f1ff633a8efdf3707775de3364c3d6857d4bec67c976cf6ab1b33f8eaeb7a0754d7d2e6236f2abcc5228aaf83469bbf4be8ff809e02a6465ad49a57455540a7bad07ef440fe4f3a27340365831e6e7cf472c0d91445378fa16f8d2100bc5bf728e785fc500649dc90f5dec7fc337109b9711db145528d62e08dc75146b7104ec5ca172c3a4dbee149c980b07e0839d3e352f216e60e2e0dcc44c14221eaf85b70c3b3978d03d8772bbd621ac9417ccb55c4f7c6b560771b0ebb0694002f4e957fb98c9fe07d23ac8e14e5c2e955decfd33c73bb19ecb9aec7969d71759b9c09a9855c854ff295ffc18b534bbb7cbb9f02e9f97aa5decfe83201ebbc9337b66e1237e397bca114640738916a1e76231fe1fb84a799c5011b4c5ef8308135416aa45000f52f112f97bf8c2cdbcb255b2752e389ec957b5d7c22d5e57bbea4e2beee434bc0b71a8bbd572efb018282cda6ac86f0318b695a8d9748cb5c93516b682d19b19e4a1b5298f0bed93102fe1ae3b18060c1d81826ce9ebfe2ba63a79f17d8b298a8846d83a04d64c7d0e5c9b2ebd882e2a0f9d69f5bd808f2c8794e36dc7ca0de8c6fb6595c06c8da3535fc8d659f2e2e53bdcb5a1eb35df583b87b0abc38e8740ecb4d016e4ab05c35c4f313e4535d87a34753bf3e94391a92a4a4774d8b595e3403ee9dacb31796c15cfb8f0c48b4f1a2dae6027da75f9535faa6513d5c613d7a1843572827913f7bbe7df08485a895a4311ddc9b721d25beffa94af1cf773e7f6a4ba90cade05904ed37317a8a166b755dbaa76c634befe709ebf0161a4670ae50a4bd6c943df7c9d8568141c3f89e466284e8b37d277c1fc227321cc692caa9116aa061f4e53bf198c0b9c34cdbe03e35a701fda434a7c41c7d056fcb94768430f2c4fbf1295f75f0ff66eaf0d83336bb3aa3de74d7bc1d2636717dcc577733af3900b68fdb7e75e6e7bb2b5f4d89f2d197460acb83e9eae181f3b64d252a7e59f7a7eb149225e1b72984c42d4699c95148aff1ec1201a2ece541e9be6a79c1e10635090814e9989aee885a908d60443231fc69e18469c8bc45570fc00c5c8eb6a35d2e2b097a5e876761a7024437e2da8f5e55d33e253f9b0d03703e1238861164ca5ab057d00f04de692e2e3332485c23fa70a34b61cea07940eb0fd6abbb77e3ba68e7c687ab53b58b02f013c1268d209cef6e7fea9b018ec49379b7905ae786f8ffec0e919a95f53714084b3a646e2275ecc0ed15bd36ea2b6e134dd10f4f554eb189d10062f977a4584345710c0f8e7ef7c1d6951e2ad3be552e4c98ea4146f80b0d7fe93e9ff3dd2df4bc89029d09b6980f5b2801c7425fe84500ebc40e242036b9a4b4ecd90c65a536adf7029680c6469b074c999956315d76c5ff2e26e4f8ed56b3e2e77c9fc12a6ca10b639880620d11faed62d6d1cb050b6f19c00a9b9df322cbb99fc539aae62dee501a5a10c2108c109d22d992139a9f8652f33febed99163f63fa32aee166cdc5b58fd9d0936e93cafa84b37c1bf4778c673636f9c0bd984a0cbeca2f7589aff18976917a6151c88d0c7241a4f2d7642d8dd969d458c470adeba90902035a4c0f5bc168b4126b0d11cd9133e0e7069b36caa4a0073f23dd19f1f2f47854b5848ec32ec9f6b1b20d69b80a4ef98dceaec3e3d1b0bcfb0325b9a07d64bc15725dcc930b6f39fa6532898fab65d200a3b0bf55aa6d4d6bab7d3b5cc0d281059cb4254f117b1021d46b5178d169ee6c2149bd2228055b7cc77ffa8d4d8900313225b9fcba58dac36dc512c1191dee1d8d71e3d4baac9936e1e88060c44a920d1a428561eb57409659870ca6ab11b8eff81b586caa0201fbe6b2a202545c5e6640e1295fb44bdfddd9bb17d250df8488afc1478796960ed99b737d6395634bd6ac81d7c0a9782353b231f202b904112f4585fc704029fea88c6b32eb83e9b35c052b9c106868b83a2bf2a5ed76a61c72416c84857d26331ec2c2dd20d26f9d0f1549cd8f16d8aa87d26f3ee8a26c4553549c204a3b12745fa97895050bcfc9fc8dd27fea61024d9c59831054b1fc395f9f29ee177a825829e673d41415909cf608fefb13b3cce32a3c9892f883ab0def28ea95349e76b9c1abb57bc462590e36af76bab931b674433e9e1508a82147656f8ebe944df140e5c0edae51610cfb1c024a0ae671b45331364d108238169a7a422b3e59601f8787400e4bf98fa7775e26a6025af33ad84886ee0f3b9baa8dabed06d04776a934cd348d9e0f4ef090aee540dcab1026f81beb8660d04a672e40e21b9b97db350626768dfb81c7f2bf075d23e606ca50fc1f349d0865b5260d5deb8b8e9f40544651406b569020259773400722145f4db991a29dbd51d45e8b9176a1b103b6109958101c6bfdb2c1e1def3562596dbb573d62836750756a0c2a160ab604944455b020d076eb95db40f83ab9e85af803e94c326f8416547f677a3814fb99fc3cafc0707569a85fcfc0fb363b7adc3fe85286bdf156d86036be6dce5735a9c69eea18778f84e827d6446b9b32c11ba0377fbb6184a7d49b7330daeccc19fa543bf200ebe7199d154b92c373e776a4fc480416bf2a1772d536e03a8a7d3d82a505ea79fb8816b4cc4abdbcfd196f39aa0516ca282575eb72d3d0e2e20c9158747b95dda046bf7252adc743893778d86ff1bcb6fad8324969370e2a712a5909018cc5cd2c1d69f5cb2138c4e3f04db32db1032200c583da76fa4be3744879ec8aa6e1755152ff142c5202538135e725a7be9645b9a022f2501c3f12764ffd675c0da5e00316b1208f10a0cc7cd0ccbd8b20c7f86f4a2f4e56f7a3650f02023f2d5b35d6786041913d4d5059ced5eced0687e42de66463f3cf2325f645f93f1e8e662e4d1d4642a6945dd5864bf555dcb9eb77b0b0a894cf08ea6b3d5e391439c4c6ba1d229ec5e82ea5429169db7d5537226e95ca7416a1d8c52a84511c3abf8b67e41ed116e65d97661a4b31f529d09d0c4a1e63dcd8a136e0c014b4e803b318be1372d8020a8cfb4284900682bbf973baaea941724fe2f3bb556c653c1c0fd9686a31b6df97ca44e1adf094d250083cae114d3b0d1123af73fcf69451f5c51ec0fed66bdaa678c980053a3881132aeef928a02eb76003bb9e3611753bef64d8f820fead98593e717b0db5e5b4af690c6bce9829d39c0d72efe57f8535b9c0c2d085dbfe25b33250af6ed7668123483309f5500054365fd6250768c3e9e5284e101c652ead233e20ee40142ba852add9e5a390d08597b711a087eb9001f9ea200e9b988127942aaa48e3a5f746940c3cae12ed8da6b51968961f7ba665757a92e7e3de0b331d767198c161bfccf87aa8deeda21027ee479455d4e8a2679ff06e8724c1aee7c5ff777b4c5c467504a3eb977975f67fd7a5ff2c1c715c207d103466ba9a915b10642e867fc853dce11857dd7e295bce516d01251c376ed154f50e26280dd652c1de6e6d30f910048a9fcb348b26fbe0c5184c9963e747cad988a683d7c9e6ed29b2b183e2c048ed135e5594af1bd6e0e2"}, {0xe8, 0x115, 0x5, "39fbb693c9672faab3c96fd2e8e672c5f286a082ff2a2d9c93e21fdf6daeef157e46a2006962b1d978889daa0e8de7e556d606509f745b6001b663280fafba7ec6a7a682a526c7b26d04bb5cbf850ae7060be2b075eb214eaef3a8f986c16872848b4dcf38f267b9efee5092527c017614c9426e27ed99968f075affea86e1d62b0be852ce83a469db1fddf84358dbe638d56a42b7cdeae2b8aa955aaec86aa5b59c13bc68054b42bd864cda76b533a2fc850ea8fde82a580ad0e58e9c6c803cfc4f40412ce8d41b704d2d97a1f2025845"}, {0xf8, 0x115, 0x5, "e213b8a35edea66328066cc15ad02a6a6a02c34d42552d183b36d01d6e06ef47fc65fcecc6bfc565fb6eab26a424703a503047f960081f7408c8b778db2ba1481a659807a7709c5d6146fac9ab32d6cc64330a5ba718b5acfd02042401e8ebedc38c0ee68608e3046e5f8f11ef6815e66a13921c1a8917f07b42901716ad31f239751d815590c2043096e3c69b90251474cb42b9ca5dc285df842e0f176e21b2d736bba18d1edc437666ad48dbdaabbaafadacc36c8467fc91800ae0242c556c21d7e36367777eb9fcff6d6216cd87aff12967eb767d924343c8d5d19b6bbe63ebc25508"}, {0xe0, 0x115, 0x8d5, "9ddd08454b6ede0d772f89c03ea80313b4cc88107a2719f373afae6a730b8bc859e7b7a33bd7549de3ffab6ced7741878be712f8b3fdefbe744b9bfea3edcf4324de7d53ca45e921334cdbad4bc05cdf0ca52555208815f5c7caa625e60b24b14da504633b3296983e265f46630e1a1d963ebbb0df7ee19c9a27b4b5a8e3a834dad6eb647b3524b9e55022069195e7f52528c589ed5385ce8344aabfc2ca76a1c5225c8f474717638730c110622f7345f3e27a31cf49a3658548e7e0e990f7be5de6c3a386e4f4e39416"}, {0x90, 0x115, 0x7, "36a6d292913111c9e05cee4b6d82616971ea8eb0c4c130a978ebcf5efb08e0127bbb3d8a8b590ff63e3f577fb0dfc376e019b80510f313c98864e91b777ac75f46b22e2919c7e00cf82563f6b2fc83362a7d984c2cb6202208af2149f07467594c05f7afabfe8e61019c459aaf82fe667134c656aebeb4d1c14afe8fc69429"}, {0x78, 0x109, 0x524, "15ffa4bac3665468ef07c506486242e196bf9eabe7ba178d7984205a8bfd060d971cd26a4523bc972ba599d7c3b224419b1f289077c72a01cf38256d2125910dc88d963bbd85eb641291065d290400e3a578aa81fa6c4339fbd778fd3e214984f6a168896d"}], 0x13d8, 0x800}, 0xae89}, {{&(0x7f0000001c00)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x0, 0x3, {0xa, 0x4e22, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x4}}}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001c80)="d2acac3e3145b2dfcd755bf4562a2429f592b0cba3c0754bd06e83730b476a26d75b7f86e8b8ef5b8cda756bf883a38c9366d4dca84a89f3269edc34b7302f1ea0626e0ee951b709385c1bb73b2b85dfb5b210785b92da06966c6dd30c59ec207359cbd0c356febe124fc75888af53243771e03049ee7ca9833a967f7abf4918d5315814046b33523ffbf6", 0x8b}, {&(0x7f0000001d40)="686d68e9108cda4f83172a", 0xb}, {&(0x7f0000001d80)="0d62cf6b043dc28886e1dcde4bc241aea7038f583c61a3900f1560360bc16537967be39e09c85d7b5d56921534ae1da02b2190c81c3f15cb7108589237cf487fcf23ceb36529b85f5ab5e923e8ffc9ca7628a6ecfbcf1186f665488de375a9f99571f9e3b95e9ab4921acc18761d01fed08606314c217462a36b9b17095565b16a3f886c052dd3d223c0ae621cdc8e039a92f242ed3cb9688c904fc914dea7f95cd6d56a6d323c582704852035595222a7bc4633eb6ca92cbb7d0528910e88e93cdf2d1c443de5c6a62342e3f6c3220de63433520b1a498d20acddbb7b62b5c44b4b8fb32ceb7163280153519e9df374aefed9c7c440c7", 0xf7}, {&(0x7f0000001e80)="e776050878edef7df4327c9c33bf97ce40ac10ce15ba548c37c52fa1b4067f960f578a767370a7c3a7a8491ba2b50b", 0x2f}, {&(0x7f0000001ec0)="db667f6e0447ce561a8e86c3dfebf4e176eda131b52a37", 0x17}, {&(0x7f0000001f00)="fa0d3ffcadf716a13055eaf3891bee4c5f2b2c53ba2f92db56450d91d79204bee1a980ba7599886ca6b7e7768c9e0e1b7bdd26a1d3b06a93ca56976685f472ee8f9e34e948e05eb607e45300cf9bce82ab94cfa092951fe3243e93cde92642e30291aabc7decf717352bc65db56c0fce22a2f35212315d007152eb8672a38f2187bebe18556aedc2b8075e84e4dd920951463ad0969149e4b72fc732a580f17c9d79e375c9140965cd17073c2a3044ce3240c0524640d04bdd45c53bcfa8662f08e665a3368f19392d0f41d508a7b91fb85c51e6cf102ad28617648228289990b14f150dd2505a66564888c238ff4b56fb6e53", 0xf3}], 0x6, &(0x7f0000002080)=[{0x28, 0x10b, 0x9, "64a65cf538fff84da940e12dabf643af6163f75088"}, {0x70, 0x103, 0x101, "509dedb4da9c0b71261987bb38da225cfb424c11ca8bfabf77681c1e0d0881ac25433aa2ff2a4280c779743791a7853a0bcfb4005a5039f0eed72dd3d0f36982e7d54d2efa487f43cc24075d4411cd2edfd1a231b3e33585fbab"}, {0xf8, 0x3e, 0x8, "2dfe76778e53ea57f9a9c06da83221bcc00505cc0d6d10ef2366ff0e7f190cf3563fac0194becacc38733369da334b025a63d379abbe01990005af3c657d187a4bc5f1813697e7e28bef991a7590915eb39441ca3c972b11e8d4d664f541178cf3520ec94a3971685d5cec9ccc99a32e7f2d15e2b9fd4d0e838eff83e6e0b63d978f1aa3f4037757999f10d9a56edc252076fe56222dd1ab9f29c04c95228e1fc9345868ce15386f38b119fc04a36d4beaf495e79a8a2e7edf826b789ef85891e166603ee66c63ed63221033e9232597e1a13022f92e9f6fd99a80484bcb62f771f26946d8"}, {0x38, 0x6, 0x60d, "d588d9b5def048d0aed7608c18cb3b4fdc3de321615d0142e1d0af2211584fc1c8cc0e"}], 0x1c8, 0x4801}, 0x1000}, {{&(0x7f0000002280)=@rc={0x1f, {0x6fb, 0xfff, 0x2, 0x7, 0x80000000, 0x7}, 0x1}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002300)="904ad84c37436dbd0a8a72ac7757d98ee5fb4c764c4928c07c09a4f1251c9ec6d8a9d6d80a3e907cdef25ad9f9657f4262b738e4fa2deaf6277d5352c140443926f70ee26c5f6830d31fbdc9a7f73e48a46b3f59a40d97f8367864bfe11c9e7bf29f499cbb6fcd503d6008c86269111276bda6504ade6f5dc22eca367ddacbb38f945ae6be70418f072a367886b78fdf5b25902f4b700427d995b289fce33f9b54ea3f0bacc42abbcca2d81a90669bc903a469fe4aee10", 0xb7}], 0x1, &(0x7f0000002400)=[{0x68, 0x11f, 0x186f, "223c9bd08842404686806404f30814a2edcb3c0c66e317f2df31153f8de7e10d1af421560688f2f2a6b9be3dfb47674649946d7f6d44d2fefb9ad49c58a98fd89cbd484ec3c59757140334331a1f8afa4aa6"}, {0x1010, 0x1, 0x78, "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"}, {0x88, 0x1, 0x7, "bb01774c9a01167a23689183e58bee8f0c195a3338529beea0af67f53e9814c886aac581539dae5bc6dbc522d63ce7710628f239c173272391fb291d672bd64f422cf412ad1a750c15037251f89a1a369853756b27a5564307cd672feaedff7945caab770fd57136bef3d65a6acd9151706c3b6db36cf2a5"}, {0xd8, 0x11f, 0x1, "9c77ca585c410c28b90bba19ea2f9f6df6dac988e5bac03620af605fbf6234bed93a371724cafe198a49765b7380e58fe26f459bf2dfd4917b6957a9dcc6965120c741ecacc5e54f64d069a3a571ab9c1106b5391ee155753d7023f6edfd5892c48bbe04925332696293c25638cd6c1243475157ce95e38cb5cfefd9c59e098a13103edadd8972d370a761285d95808664f230bef293284c8f6d4a05394a8cb60f846cf02877b179e3b56dab658f7f61ecc101c56b54fe13ff57471a78cbcf8bae4c"}, {0x58, 0x119, 0x8, "2c42c3a5ae2f041b8f9fcb364b15ef3b6c71cf6389dd28d140720abd8fa844e55eba0bbdb9c50532c32a358838517b87cc9f4e3cd91c032f61a74a9b7e6bb60b282afa"}, {0x50, 0x109, 0xd2a, "33c2ad09b4eaa437e3d33576b1350e23bebe9482c148c00b3b2443e1df68efb696c040d2ec7238f2a8489de007ed1e02906bf0a1aa51658dab"}], 0x1280, 0x4005}}, {{&(0x7f0000003680)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80, &(0x7f0000004900)=[{&(0x7f0000003700)="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", 0x1000}, {&(0x7f0000004700)="ba32ca512ee7adbec36166c73f0f938b74f951ad4a4ec2e6ecf70878425b0ea590afabbae09ba837c33b0d81aa73df3cfe890ca9d459c50acec97307ecb91f3c383df9269d5a3fb4ed8d9771019e6ebe41d53da95ee21117c54ec2ae02fb530691cfccd1dc30dfcc53f029af297aa4764d65b3a117fd3fd5fbed195c370a17c2c5f598456ef9876492e2dcfcc22c1f056fbe6221ad694d718b3530f3cd793cda982f01e14b93d4a1df095509d73c8faaf7c0de4528d70e6cfbc994139e6624cca12ece865129d99b4a83fe1dca68399560c54733279c95b1770087f314d2c8ef117558d60bcbf6f749b8eb7ea71e2d", 0xef}, {&(0x7f0000004800)="9ac51399cd32e0c0d0e0af68c74eba3c15569c0977461487e0f34c491733d47680edae7cfc4f1caf81c02dcfca372aad2730e0fb9e10cdf5044f23f2df4e9be2a95e9cf5113b72d679e02239de5d976108e26854ccf923dbf95c9945c6e9f30dd9b850c73714812eb7bba5e325a11435cc033459042c105528a6f31f16a3ef115a3bcd35a77b9ec3466b6d1cffc54a7bc6f01be5f6aeaa0b9cc75e1b650da96b0e6a4401ce0d195857d7064b664ce6062a91d3a657c4705943f30546c400ba4f7da08ba8af4a223202b2b21f12a16f192e8d745f5b1017931445ef2e09f0a97b99c3e8f67a46cee8407c7cc1fc03790bef3d93c879e5da9a71", 0xf9}], 0x3, 0x0, 0x0, 0x40}, 0x7}, {{&(0x7f0000004940)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x4, 0x3, {0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x7}}}, 0x80, &(0x7f0000004d40)=[{&(0x7f00000049c0)="e412c960bd181c8ddcc351db70ce1a17cca65c7c5fdd14a63f04625c52697d565d03afd879c6972c932250cd8621f57fd3cc173acc1e14b6a326d72be73874f5d8e3957ffab576b1150e86794d831ceb18075ea1e94f2dbb339ebc151b68dede3fd9d0c716e0fb3bc4d4886fc574aa007c737fa3b3183aa146e66534079e4082faa6f0c8d8a5b9248ebc44d4efb6b86e89be1bf1f6019aca91891b4e7cbb877b9d135bb2db2dc388efd5cdd0a4729f310b04ad707df945cbb69e13df32e27ddfd9b1c53c3fa9e10172386e10ebfd15ea700fca65e5fd2241e0d68f0488f1cade2640a9922a9044536bd8c109177ea30bc243ec8aa4504d98a7501a3a9d", 0xfd}, {&(0x7f0000004ac0)="3446df968a215aeb1067b6e6bcb1391c7775e599bc7490e00c9e511c27e73cc411618592db247e0a4c9fd9c975f51f9c5e162de35e4141155169a978edd7fd670a06b3bf6484e452e92d241486a7e48891a55aa4c34ec4eda15e3c3e6775ec94", 0x60}, {&(0x7f0000004b40)="1d578193c89dc99eddfd590a2da451b5b9baf301f53e929cccb6f0c4916ecedb76d018e97a012eaf1f9fb5fc3fb3c1b1b16296abfe46cd595abf782ef4e2c8c3b2650f110ca48adcecc5e8842337253fe47fc9cedaf20e04b6c6e8b59a21493da7cc0c8ce207ef37c50857e000ef97383088cb88a5f5c7089dc942b742c18644b403d0aca9fddc905d771aad383bed1129f25bb23c32b46c9a653669738ebb9fd688dbb8ad41f6144014023018e62f1d865b134c1d5d641b56f47a842b1ef711e7fd1da2dbd8889ac18f791d2483fb65ead9e68fccf2222f63c8700a94e716b78d", 0xe1}, {&(0x7f0000004c40)="880e47379d1cf5ee7470f9c4a2730bb115ffeb4387b5aeb10e6ee26da36ebb61db6a52c964b018ae358f0460913d99b75ea76edcce003950c388830154649233ba9821d2b5ed993c12b910419af3b09d37fd30a554874a87ee70348ca547305c4c22af5bdbdfd40dfb4adffbcf21534e5e3ec8d8299902e151620277ff0fac95aaca16b6e28c258b5d5f9b9dbdbc4b8024c6844dd69cf910f62083e93d29f9617041c983834c71b9f86fb04b4560a5fad147748f66acacf3d635b3d9006ddbce8875c521893a6a0aa908a59abf", 0xcd}], 0x4, 0x0, 0x0, 0x44040}}, {{&(0x7f0000004d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x0, 0x0, 0x2, {0xa, 0x4e21, 0x8000, @local={0xfe, 0x80, [], 0xaa}, 0x101}}}, 0x80, &(0x7f0000004f00)=[{&(0x7f0000004e00)="57928dd5a440a338fe2c0b010f52f96e7160ea2ae657523d2b30f1bb77f11b81d700ebfaa165e62319be3569f40eb597752f7060e79a2f38c2d475cfe98a7b2dda703a7ac317f5595835818ae65dc9680ef26b7702dae6490a7f2139c30e981a464af98f35c01826a2e717fb0867b527f20d0ff6b3b730ba03ad8be95db282987dea1dcb2e77138dd534fa26f5346c7652f650a9e2349ba0bfa55fb60f22dd43c59faddb3873feaa6fb70676d1517c2c9530170e5bf2be", 0xb7}, {&(0x7f0000004ec0)="a9a97b84cad74f221fa5ca52e3418b58d3e8dcedb1bc9d7f0047d44530f068ae4b40b2f5276d66cc1e2139205a430aacf98c17a1ad16", 0x36}], 0x2, &(0x7f0000004f40)=[{0xb8, 0xff, 0x73, "878cf86127d5547d693f80e27fd0865eccbb2e9cb987aa7304c2c7ff4c4a4a69652ba9eee8f58b0922f73f505ace0bca4311b3aafbf5256ef60650c009a98b278c24717e0880c357779e2763054be2bc0786a7701c4fe1333e668a000b6d346dcd6e1277191c604de5a548a1aae5ea730328beb0c97cdafef0c6feb2de018e86d8d667ef77b69693f7081cc3eebd46acbb12a01cd590a32e0dc86ac42a0d322acb49bbb7fd416784"}, {0x60, 0x107, 0x101, "c1ea8cd6089452f9cdf6cf4efbea7e0de6931a865a026a15e173bf316657fddb807f40670fa08d0b7d9a6c29c34db6ae7620cabd8359eaca1f8d0a367974de1fc48ed18465bae9047d4100a7085ac2ca"}, {0x78, 0x10b, 0x20f000, "6bd0defa17298bc8e854ce005661e34ee29e35a233e5a58a9b0878693902b510cd5f8ea19829d38c3274932882a23b79c366dd28183214cdc4807caa858715de5ff72f6301d1423f3c232189aa8e3efe03aa248674e29f882d176e44bfc7dc83d804"}, {0xc0, 0x1af, 0x2, "95b0b4777b63d7e91771136b82948e6edd1ee8167d2d2640de97638d2f37373f7b8c100a67450222c2faac97198795b2c9aa69b8695f1cd0864b1e468b1dab0549fc49511f4def2f373910c9fe360422dd8c1ddc47d2b6150618a1cad072b4ffd4e7f84badb77b9c76c106a38fa096399facfe2003ff5823198f29d59c2c13bc3a7dcda0c64583102aa00bf313512334eff3e22903f73e56b958a66d29d1a261e982119a30dd59b5e4"}], 0x250, 0x24040000}, 0x4000000000000}, {{&(0x7f00000051c0)=@ax25={0x3, {"91a668812eee99"}, 0x2}, 0x80, &(0x7f0000005700)=[{&(0x7f0000005240)="8c35d6987980ed130cb33eec617efc052904377ee93db3b47599a282b3c20fc382ed44d92af786ae1e29483be2ebd37780d46f69b5c578630e693ee5873d43de67e57318caa48bd5236d81b397f3c0fc3bf7a7050d765de2408d1b558a4629791f94b6dfa75cca6e4349cdcf032d302e1964889a0ccce60bb79d0fa8be7b6b359249b4db5bcec6d64742e54ca20d38c896a2d59ef49a9322b0d44fee7903c35e4d86e212d0d5658b2659762240c783f4306fd95c4d37e11383568a7b2420", 0xbe}, {&(0x7f0000005300)="39e8882fc60cfb685a77cfd9d60af796db420e3ca242d686fcaf5efaa96c9bcc669f8f299f3c690252023f7ee6c162363c5a7fffc9aed96ff530ff2c0e187263e5f0e605858846bdc01e15b7c538fdc7bf333d305b439b", 0x57}, {&(0x7f0000005380)="8c8ac19b5f71a10df316fee0550e92ae8dc22e4a9b17ddc3", 0x18}, {&(0x7f00000053c0)="27270d96bc50510eedc67df34be1bad7257982250705a7921271bab2d607ea87ae918d0a68fe3ba096815c743da7c17fbce36c6e8d46415f5e94c7694a02ca22f4deab06eef4b82b6c5830449f72d9", 0x4f}, {&(0x7f0000005440)="1de5d12e525dd5f21c90180d96f7695e710c833d51ab1acf641320a44b2b30437b1383aaa0ddfb8fcd1166508e85bd228e5de56ff36b5b98e53a731b0eb8048b25f8a1997de2725b01703e6ce356938e79c2554d87a766fe110f1ac195114731192e5fb3cd", 0x65}, {&(0x7f00000054c0)="7300c10d659dd8538ffe8735b5b0097edcf4a8c706c6ddf0b89e76adfa72f58922459e4248001204a3400356e68305a125e16544f1da1156721f4e25c59a10cbe17af306decbdf9577e76366a9c28ce67813e66b489975eb4f8b7638093723765d409c59aeb9", 0x66}, {&(0x7f0000005540)="40a7a870beb60283c692f7793e0bdd83002f7fa1171c3d2801147e629d42de3f68fa9720e326e9c31220a48aec3847a34dec645924183cf30e582ba8c574e242e12a9649df9791425d2f5f6f80f2090f3303fce2a6aad35fb1c3250f5c9bf231", 0x60}, {&(0x7f00000055c0)="d9f5c338bc3386d6f78a86e44564657f58cb29b8c13b5fc616698d80965211580c0359378c8a31d76da5d0b69832ef5d3f989d8f6df4090c4ad8b1636aaf3bcbad510f871dbde076c4205bec7feb236463135c0e262cbfa4789df775a0393ef080893050fd70ae436bf57b318942caaf3b6bb05d53df772fd9fc1f34e94df8b5f6d52275f90a744e15bf6c7d5a0835b45166b8ac020acd39751ca8a21874b4fe65e62d3a374f8476b3003f9fa079e5c8ee6531dccbb949ff90bf", 0xba}, {&(0x7f0000005680)="490dde44ca15baa4a6fec36185206f9158dd20bd0829cf71e9180dae37814ec4886ecb5b8320aa76272ab98c4b77897f4b07bb634f9e4e862aa3b417e236766a7ab8a1c00e65e1e24b69e00e3762b71d1baf15aa29663c04971ac74d3f428d50073a43108647bfe1e42e938f0ab6db66ac", 0x71}], 0x9, &(0x7f00000057c0)=[{0xd8, 0x109, 0x8, "f07a3cc81ff6a3fce07de949a93c581d2dee23dd94ae2b4f4f58f2ed82ad8af1dd15afe1a9a2798049d206c86abf12fa1793abaf7a2c5f3691190713c358721e81d7d9d1c417bb8d0589f258c451f0874a9a91317b1a672715a9a3f1dc6c0b365c7b5c44d1ea06bdea0616c22adefe76007be38693d1132bab5f5822c3599522b8fb0152a443b9e81fd4e9367ef19aaf43819a4ac8bb2d2c6990b0ca6f8778b66764eb4e27d0c48324b2ec5b57612bf41a7f1bc3b0d8fa42938d58cdec846b56e6fa"}, {0x68, 0x10b, 0x0, "510af136ac90204153ed7be7206225811e0a4c7e5f70d4a5955c84aaadcb0d8d25c8aa3b6bd82b7bd4f45527a769ab5ffbd4f386be37d02abda98d25063f08d2e6f96aae0731706d46d752f99fde8628bca85b007d"}, {0xa0, 0x1, 0x100000001, "ae200983827c64faf4460e22d14b728bc703c9852963a51341028b846b39ea51939ef52fe0c3528d7104b474fb25a3195f4cce5e3b5ffcfefce1b7e615792430c0aebce3d056b867dc30f44e69d046153defea827613f8f183bfd1c293b4dcb05593729c0018332c8a946ff2f554cf323c15f52173ab63b58398c07123028b05a9d5e4d68e76d3e246565c8515eadc5e"}, {0x30, 0x1ff, 0x8, "56259ad075c6549dc905e9210a53f0c66bc9918a61cbbfb2361cc9281ccd"}, {0xe8, 0x111, 0x4, "9a7e763dd65972ed26f00343c0b1aac8132187258e7fd235c15076c564f075a48e8ffc8aad81903da7dae7fe79130705c0697326896a37dfe4a7a5c5237d926a811628c9e856c3c409b5012e891ea8190b5470f5975990df3f0bbf3c7282ada68fa15e1146b71f5bff1bac68a7b054780fecc39ca4eb8b2983d993aa0c06356d6b12b36e39aec1e50699117fa975983cd70f7ffd01e49a0abea86baf1f0753acbbef73ae05901ed8f105f1a150fcf77e4628f78e067d6c0e3c94309d00e886cda57de116e11a320ad318b3305d1a6f1c019f89cd639b9b"}, {0x100, 0x10d, 0x9, "b393b31a57773e132fae7472b23b6712a5023447061359468ff82943e6e639b0958415686a2e8dcf37006665c3f5d6d869ca73f108eaa0dc3d02443721e10e0b90e565cc66be300275c9c482f9df99edc05912b07ffbc762e699762d87de73bfa4e8da0c857a032a6fd048a0f7a6dfd204542eef3fdda95755308853780729637c5691610afdb44c6278c2b678769ac8c04de890c845f2ff62478fdba0cc941e9c211814b399e86613104b47fe1a33bcf1bb2a25dffae01fa17bc10ac89f1349822a473f1d00aaf7348b413efe4f8e68dee65471656309a5154c229a97a675c5ec41dd680d3876e883"}, {0xc0, 0x11f, 0x3, "48a87ec7ebb6313e8e734fdaaf930e780986c7de455d6ed676fc86b4ace746e10cae06240243a4ef515d3419ad97fd89ab1ab7b3fab5488fbc1d8624fae84ab085ea544deb43c3b15bfc730adb37133c2205b29c2a05feb0ff8006af3c8b663634f6571292c96c1beaecde86c5dc42095c922199cf92f7affb406da867ba7283ed806c22a8e31e6ee4b52b764255df4320690800f99b75ff2cb7e34e8c53b180c2193dd71d50457400474a508b906aaf"}], 0x4b8, 0x20000001}, 0x3f}], 0x7, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f00000002c0)={&(0x7f00000001c0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000240)=""/89, 0x59}], 0x1, &(0x7f0000000340)=""/236, 0xec, 0x8}, 0x40010140) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') fadvise64(r1, 0x0, 0x9, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x80000000) 00:46:48 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:48 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2721.613386] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x4305]}) 00:46:48 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0xffffffffffffffa3, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:48 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300bda31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x2000000}], 0x1, 0x0, 0x0) 00:46:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0L', 0x0) 00:46:48 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:48 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:48 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) getresuid(&(0x7f0000000140)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) removexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@random={'osx.', 'security.evm\x00'}) getresgid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x2, r0, r1, 0x800, 0x80000) unlink(&(0x7f0000000000)='./file0\x00') [ 2721.730701] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2721.739312] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:46:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x2c000000]}) 00:46:48 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0@', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2721.782940] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x1000000}], 0x1, 0x0, 0x0) 00:46:49 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\f', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:49 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2a, 0x3) unlink(&(0x7f0000000000)='./file0\x00') 00:46:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:49 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece039a01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:49 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x88470000]}) 00:46:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x700}], 0x1, 0x0, 0x0) 00:46:49 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:49 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2721.934817] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:49 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:49 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03ee01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:49 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:49 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x10}], 0x1, 0x0, 0x0) 00:46:49 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x3000000]}) 00:46:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000007fffff", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:49 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03d901a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:49 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:49 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:49 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x300000000000000}], 0x1, 0x0, 0x0) 00:46:49 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x100000000000000]}) [ 2722.150460] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:49 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece031001a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:49 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000400", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:49 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:49 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c653017", 0x0) 00:46:49 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x2c00000000000000]}) [ 2722.278837] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:46:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0xf0ffffff00000000}], 0x1, 0x0, 0x0) 00:46:49 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030142a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:49 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x440901, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000140)) statfs(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)=""/155) [ 2722.331856] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530f6", 0x0) 00:46:49 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:49 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03007aa31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:49 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:49 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x800000000000000]}) 00:46:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x200000000000000}], 0x1, 0x0, 0x0) 00:46:49 executing program 0 (fault-call:3 fault-nth:0): stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:49 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653085", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2722.523301] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2722.531863] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2722.551708] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2722.572578] FAULT_INJECTION: forcing a failure. [ 2722.572578] name failslab, interval 1, probability 0, space 0, times 0 [ 2722.583871] CPU: 0 PID: 31430 Comm: syz-executor0 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2722.592271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2722.601617] Call Trace: [ 2722.604208] dump_stack+0x1c9/0x2b4 [ 2722.607848] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2722.613042] ? lock_release+0xa30/0xa30 [ 2722.617028] should_fail.cold.4+0xa/0x11 [ 2722.621099] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2722.626207] ? lock_downgrade+0x8f0/0x8f0 [ 2722.629674] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2722.630365] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2722.630381] ? proc_fail_nth_write+0x9e/0x210 [ 2722.630399] ? proc_cwd_link+0x1d0/0x1d0 [ 2722.652062] ? kasan_check_write+0x14/0x20 [ 2722.656288] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2722.661203] ? fsnotify+0xbac/0x14e0 [ 2722.664901] ? vfs_write+0x2f3/0x560 [ 2722.668609] ? lock_acquire+0x1e4/0x540 [ 2722.672568] ? fs_reclaim_acquire+0x20/0x20 [ 2722.676872] ? lock_downgrade+0x8f0/0x8f0 [ 2722.681009] ? check_same_owner+0x340/0x340 [ 2722.685315] ? rcu_note_context_switch+0x730/0x730 [ 2722.690230] __should_failslab+0x124/0x180 [ 2722.694449] should_failslab+0x9/0x14 [ 2722.698234] kmem_cache_alloc+0x2af/0x760 [ 2722.702364] ? __ia32_sys_read+0xb0/0xb0 [ 2722.706410] getname_flags+0xd0/0x5a0 [ 2722.710194] __x64_sys_unlink+0x35/0x50 [ 2722.714151] do_syscall_64+0x1b9/0x820 [ 2722.718034] ? finish_task_switch+0x1d3/0x870 [ 2722.722511] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2722.727423] ? syscall_return_slowpath+0x31d/0x5e0 [ 2722.732335] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2722.737335] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2722.742333] ? perf_trace_sys_enter+0xb10/0xb10 [ 2722.746987] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2722.751815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2722.756989] RIP: 0033:0x455ba9 00:46:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x10000000}], 0x1, 0x0, 0x0) 00:46:49 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530fe", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:49 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2722.760157] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2722.779412] RSP: 002b:00007f3a5f29bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 2722.787104] RAX: ffffffffffffffda RBX: 00007f3a5f29c6d4 RCX: 0000000000455ba9 [ 2722.794354] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2722.801621] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2722.808871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2722.816132] R13: 00000000004c0164 R14: 00000000004d3f48 R15: 0000000000000000 00:46:50 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030023a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000400", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x300}], 0x1, 0x0, 0x0) 00:46:50 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:50 executing program 0 (fault-call:3 fault-nth:1): stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:50 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2722.909051] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2722.917593] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2722.929120] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2722.973489] FAULT_INJECTION: forcing a failure. [ 2722.973489] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2722.985339] CPU: 0 PID: 31469 Comm: syz-executor0 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2722.993738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2723.003086] Call Trace: [ 2723.005682] dump_stack+0x1c9/0x2b4 [ 2723.009321] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2723.014514] ? __fdget_pos+0x1bb/0x200 [ 2723.018412] should_fail.cold.4+0xa/0x11 00:46:50 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2723.022484] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2723.027596] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2723.033141] ? _kstrtoull+0x188/0x250 [ 2723.036949] ? _parse_integer+0x190/0x190 [ 2723.041103] ? lock_release+0xa30/0xa30 [ 2723.045094] ? trace_hardirqs_on+0x10/0x10 [ 2723.049353] ? lock_acquire+0x1e4/0x540 [ 2723.053329] ? get_pid_task+0xd8/0x1a0 [ 2723.057220] ? lock_downgrade+0x8f0/0x8f0 [ 2723.061377] ? lock_release+0xa30/0xa30 [ 2723.065360] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2723.070905] ? pid_task+0x115/0x200 [ 2723.074538] ? find_vpid+0xf0/0xf0 [ 2723.078085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2723.083622] ? should_fail+0x246/0xd86 [ 2723.087514] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 2723.092352] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2723.097439] ? lock_downgrade+0x8f0/0x8f0 [ 2723.101573] __alloc_pages_nodemask+0x36e/0xdb0 [ 2723.106225] ? proc_cwd_link+0x1d0/0x1d0 [ 2723.110270] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 2723.115273] ? kasan_check_write+0x14/0x20 [ 2723.119491] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2723.124400] ? fsnotify+0xbac/0x14e0 [ 2723.128096] ? vfs_write+0x2f3/0x560 [ 2723.131812] ? lock_acquire+0x1e4/0x540 [ 2723.135772] ? fs_reclaim_acquire+0x20/0x20 [ 2723.140079] ? lock_downgrade+0x8f0/0x8f0 [ 2723.144210] ? lock_release+0xa30/0xa30 [ 2723.148168] ? check_same_owner+0x340/0x340 [ 2723.152474] cache_grow_begin+0x91/0x710 [ 2723.156528] kmem_cache_alloc+0x689/0x760 [ 2723.160659] ? __ia32_sys_read+0xb0/0xb0 [ 2723.164716] getname_flags+0xd0/0x5a0 [ 2723.168521] __x64_sys_unlink+0x35/0x50 [ 2723.172935] do_syscall_64+0x1b9/0x820 [ 2723.176807] ? finish_task_switch+0x1d3/0x870 [ 2723.181281] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2723.186190] ? syscall_return_slowpath+0x31d/0x5e0 [ 2723.191099] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2723.196097] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2723.201269] ? perf_trace_sys_enter+0xb10/0xb10 [ 2723.205919] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2723.210746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2723.215944] RIP: 0033:0x455ba9 [ 2723.219109] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2723.238242] RSP: 002b:00007f3a5f29bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 2723.245935] RAX: ffffffffffffffda RBX: 00007f3a5f29c6d4 RCX: 0000000000455ba9 [ 2723.253192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2723.260453] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2723.267713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 00:46:50 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0xfffff000]}) 00:46:50 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030128a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:50 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:50 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x700000000000000}], 0x1, 0x0, 0x0) [ 2723.274976] R13: 00000000004c0164 R14: 00000000004d3f48 R15: 0000000000000001 00:46:50 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530e4", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:50 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03d300a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2723.315697] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2723.350247] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:46:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530ff", 0x0) 00:46:50 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:50 executing program 0 (fault-call:3 fault-nth:2): stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x8dffffff00000000}], 0x1, 0x0, 0x0) 00:46:50 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x29000000]}) 00:46:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:50 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\a', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:50 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece031400a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2723.451810] XFS (loop3): Invalid superblock magic number [ 2723.512267] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2723.522856] FAULT_INJECTION: forcing a failure. [ 2723.522856] name failslab, interval 1, probability 0, space 0, times 0 [ 2723.534128] CPU: 1 PID: 31540 Comm: syz-executor0 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2723.542525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2723.551859] Call Trace: [ 2723.554438] dump_stack+0x1c9/0x2b4 [ 2723.558051] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2723.563225] ? __find_get_block+0xe60/0xe60 [ 2723.567537] should_fail.cold.4+0xa/0x11 [ 2723.571583] ? ext4_map_blocks+0x429/0x1b60 [ 2723.575891] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2723.580983] ? lock_acquire+0x1e4/0x540 [ 2723.584943] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2723.589941] ? __ext4_check_dir_entry+0x207/0x370 [ 2723.594769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2723.600290] ? ext4_search_dir+0x3fc/0x6c0 [ 2723.604509] ? ext4_search_dir+0x465/0x6c0 [ 2723.608743] ? ext4_htree_fill_tree+0xd60/0xd60 [ 2723.613394] ? memset+0x31/0x40 [ 2723.616656] ? rcu_note_context_switch+0x730/0x730 [ 2723.621571] ? kfree+0x15e/0x260 [ 2723.624934] ? check_same_owner+0x340/0x340 [ 2723.629253] ? ext4_find_entry+0x560/0x1b60 [ 2723.633557] ? rcu_note_context_switch+0x730/0x730 [ 2723.638475] __should_failslab+0x124/0x180 [ 2723.642695] should_failslab+0x9/0x14 [ 2723.646477] kmem_cache_alloc+0x2af/0x760 [ 2723.650608] ? trace_hardirqs_on+0x10/0x10 [ 2723.654831] jbd2__journal_start+0x1e7/0xa80 [ 2723.659224] ? jbd2_write_access_granted.part.9+0x430/0x430 [ 2723.664931] ? rcu_note_context_switch+0x730/0x730 [ 2723.669846] ? __d_lookup+0x593/0x9e0 [ 2723.673633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2723.679156] __ext4_journal_start_sb+0x182/0x600 [ 2723.683896] ? kasan_check_write+0x14/0x20 [ 2723.688115] ? ext4_unlink+0x477/0x11f0 [ 2723.692085] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 2723.697783] ext4_unlink+0x477/0x11f0 [ 2723.701566] ? ext4_rmdir+0xd40/0xd40 [ 2723.705352] ? lock_release+0xa30/0xa30 [ 2723.709308] ? check_same_owner+0x340/0x340 [ 2723.713611] ? mnt_want_write+0x3f/0xc0 [ 2723.717568] ? rcu_note_context_switch+0x730/0x730 [ 2723.722486] ? down_write+0x8f/0x130 [ 2723.726181] ? vfs_unlink+0xd1/0x510 [ 2723.729890] ? down_read+0x1d0/0x1d0 [ 2723.733587] ? may_delete+0x425/0x640 [ 2723.737373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2723.742894] vfs_unlink+0x2db/0x510 [ 2723.746503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2723.752027] do_unlinkat+0x6cc/0xa30 [ 2723.755726] ? __ia32_sys_rmdir+0x40/0x40 [ 2723.759856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2723.765376] ? strncpy_from_user+0x3be/0x510 [ 2723.769781] ? kasan_kmalloc+0xc4/0xe0 [ 2723.773652] ? mpi_free.cold.1+0x19/0x19 [ 2723.777695] ? __ia32_sys_read+0xb0/0xb0 [ 2723.781741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2723.787263] ? getname_flags+0x26e/0x5a0 [ 2723.791308] __x64_sys_unlink+0x42/0x50 [ 2723.795266] do_syscall_64+0x1b9/0x820 [ 2723.799148] ? finish_task_switch+0x1d3/0x870 [ 2723.803629] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2723.808541] ? syscall_return_slowpath+0x31d/0x5e0 [ 2723.813459] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2723.818458] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2723.823456] ? perf_trace_sys_enter+0xb10/0xb10 [ 2723.828281] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2723.833108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2723.838278] RIP: 0033:0x455ba9 [ 2723.841448] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:46:51 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece039301a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2723.860612] RSP: 002b:00007f3a5f29bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 2723.868300] RAX: ffffffffffffffda RBX: 00007f3a5f29c6d4 RCX: 0000000000455ba9 [ 2723.875553] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 2723.882805] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2723.890055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2723.897306] R13: 00000000004c0164 R14: 00000000004d3f48 R15: 0000000000000002 00:46:51 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653001", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x100000000000000}], 0x1, 0x0, 0x0) 00:46:51 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300b7a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:51 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x4305000000000000]}) 00:46:51 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:51 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\a', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000007fffffff00", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2723.982805] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2723.991347] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:46:51 executing program 0 (fault-call:3 fault-nth:3): stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:51 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:51 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653001", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:51 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03003ca31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2724.058419] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2724.100493] FAULT_INJECTION: forcing a failure. [ 2724.100493] name failslab, interval 1, probability 0, space 0, times 0 [ 2724.111806] CPU: 1 PID: 31581 Comm: syz-executor0 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2724.120213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2724.129563] Call Trace: [ 2724.132159] dump_stack+0x1c9/0x2b4 [ 2724.135796] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2724.140997] should_fail.cold.4+0xa/0x11 [ 2724.145070] ? fault_create_debugfs_attr+0x1f0/0x1f0 00:46:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x7000000}], 0x1, 0x0, 0x0) [ 2724.150179] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 2724.154957] ? lock_acquire+0x1e4/0x540 [ 2724.158937] ? is_bpf_text_address+0xae/0x170 [ 2724.163441] ? trace_hardirqs_on+0x10/0x10 [ 2724.167689] ? kasan_check_read+0x11/0x20 [ 2724.171843] ? rcu_is_watching+0x8c/0x150 [ 2724.176000] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 2724.180686] ? trace_hardirqs_on+0x10/0x10 [ 2724.184933] ? kernel_text_address+0x79/0xf0 [ 2724.189361] ? check_same_owner+0x340/0x340 [ 2724.193687] ? __save_stack_trace+0x8d/0xf0 [ 2724.198014] ? rcu_note_context_switch+0x730/0x730 [ 2724.202960] __should_failslab+0x124/0x180 [ 2724.205612] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2724.207216] should_failslab+0x9/0x14 [ 2724.207233] kmem_cache_alloc+0x2af/0x760 [ 2724.207250] ? trace_hardirqs_on+0x10/0x10 [ 2724.207270] ? trace_hardirqs_on+0x10/0x10 [ 2724.231235] ? __ext4_journal_stop+0xde/0x1f0 [ 2724.235731] ? ext4_unlink+0x84a/0x11f0 [ 2724.239709] ? vfs_unlink+0x2db/0x510 [ 2724.243511] jbd2__journal_start+0x1e7/0xa80 00:46:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}, 0x3000000}], 0x1, 0x0, 0x0) 00:46:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2724.247923] ? jbd2_write_access_granted.part.9+0x430/0x430 [ 2724.253635] ? rcu_note_context_switch+0x730/0x730 [ 2724.258570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2724.264110] __ext4_journal_start_sb+0x182/0x600 [ 2724.268869] ? ext4_evict_inode+0x9c9/0x1ac0 [ 2724.273277] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 2724.278999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2724.284540] ? __sb_start_write+0x17f/0x300 [ 2724.288869] ext4_evict_inode+0x9c9/0x1ac0 [ 2724.293102] ? ext4_da_write_begin+0x1280/0x1280 00:46:51 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2724.297856] ? lock_acquire+0x1e4/0x540 [ 2724.301840] ? inode_wait_for_writeback+0x2f/0x40 [ 2724.306680] ? lock_downgrade+0x8f0/0x8f0 [ 2724.310827] ? evict+0x468/0x990 [ 2724.314198] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2724.319736] ? __inode_wait_for_writeback+0x2cf/0x380 [ 2724.324930] ? kasan_check_read+0x11/0x20 [ 2724.329035] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2724.329077] ? do_raw_spin_unlock+0xa7/0x2f0 [ 2724.341080] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 2724.345664] ? kasan_check_write+0x14/0x20 00:46:51 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03008aa31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2724.349922] ? do_raw_spin_lock+0xc1/0x200 [ 2724.354163] ? ext4_da_write_begin+0x1280/0x1280 [ 2724.358925] evict+0x4ae/0x990 [ 2724.362125] ? fsnotify_final_mark_destroy+0xc0/0xc0 [ 2724.367230] ? destroy_inode+0x200/0x200 [ 2724.371294] ? do_raw_spin_lock+0xc1/0x200 [ 2724.375533] ? lock_downgrade+0x8f0/0x8f0 [ 2724.379687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2724.385224] ? ext4_drop_inode+0x133/0x430 [ 2724.389466] ? kasan_check_read+0x11/0x20 [ 2724.393624] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 2724.398205] ? do_unlinkat+0x716/0xa30 [ 2724.402097] iput+0x635/0xaa0 [ 2724.405209] ? inode_add_lru+0x2a0/0x2a0 [ 2724.409269] ? _raw_spin_unlock+0x22/0x30 [ 2724.413448] ? up_write+0x7b/0x220 [ 2724.416988] ? up_read+0x110/0x110 [ 2724.420536] do_unlinkat+0x733/0xa30 [ 2724.424261] ? __ia32_sys_rmdir+0x40/0x40 [ 2724.428411] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2724.433951] ? strncpy_from_user+0x3be/0x510 [ 2724.438365] ? kasan_kmalloc+0xc4/0xe0 [ 2724.442262] ? mpi_free.cold.1+0x19/0x19 [ 2724.446316] ? __ia32_sys_read+0xb0/0xb0 [ 2724.450371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2724.455910] ? getname_flags+0x26e/0x5a0 [ 2724.459972] __x64_sys_unlink+0x42/0x50 [ 2724.463948] do_syscall_64+0x1b9/0x820 [ 2724.467839] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2724.472770] ? syscall_return_slowpath+0x31d/0x5e0 [ 2724.477702] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2724.482723] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2724.487733] ? perf_trace_sys_enter+0xb10/0xb10 [ 2724.492382] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2724.497218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2724.502396] RIP: 0033:0x455ba9 [ 2724.505561] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2724.524683] RSP: 002b:00007f3a5f29bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 2724.532383] RAX: ffffffffffffffda RBX: 00007f3a5f29c6d4 RCX: 0000000000455ba9 [ 2724.539632] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 00:46:51 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8906000000000000]}) 00:46:51 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2724.546882] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2724.554132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2724.561383] R13: 00000000004c0164 R14: 00000000004d3f48 R15: 0000000000000003 [ 2724.568785] EXT4-fs error (device sda1) in ext4_evict_inode:258: Out of memory 00:46:51 executing program 0 (fault-call:3 fault-nth:4): stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:51 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece036d01a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2724.611315] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value [ 2724.624302] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c653004", 0x0) 00:46:51 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653003", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:51 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece037c01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:51 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:51 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:51 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xffffff88]}) 00:46:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000ff00", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:51 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:51 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece036301a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:51 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='//file0\x00') 00:46:51 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x3]}) 00:46:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:51 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2724.810724] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:52 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:52 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03b800a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0&', 0x0) 00:46:52 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./.ile0\x00') 00:46:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:52 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8848000000000000]}) 00:46:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:52 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:52 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03c000a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:52 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c65308b", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:52 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='.//ile0\x00') 00:46:52 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\f', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2725.021347] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:52 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03bd00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:52 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8035000000000000]}) 00:46:52 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653003", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:52 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:52 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece039900a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:52 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:52 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:52 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x300000000000000]}) [ 2725.175341] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:52 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:52 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301bea31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:52 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0(', 0x0) 00:46:52 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:52 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653006", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:52 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x7000000]}) 00:46:52 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030109a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2725.371061] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:52 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:52 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:52 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653004", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:52 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030148a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:52 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x1c000000]}) 00:46:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:52 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2725.522201] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:52 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03012ba31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:52 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530f6", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:52 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xffffca88]}) 00:46:52 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:52 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece036101a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:52 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:52 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:52 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x3a00]}) 00:46:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:52 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') [ 2725.713138] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:52 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:52 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301f7a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:52 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653001", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:53 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)="2e2f66696c653010") 00:46:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:53 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8906]}) 00:46:53 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03b100a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2725.871944] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:53 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:53 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653006", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:53 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300eba31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:53 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:53 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530f0", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:53 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x3a000000]}) [ 2726.003315] nla_parse: 4 callbacks suppressed [ 2726.003324] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2726.016405] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:46:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:53 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:53 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') [ 2726.059172] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:53 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c65308c", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:53 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03a600a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:53 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:53 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x1100000000000000]}) 00:46:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:53 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:53 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:53 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301f3a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2726.216628] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:53 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000200", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:53 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\'') 00:46:53 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece034900a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:53 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x400000000000000]}) 00:46:53 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:53 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2726.348820] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value [ 2726.372986] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530f4", 0x0) 00:46:53 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:53 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)="2e2f66696c6530f6") 00:46:53 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece033701a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:53 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:53 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x200000000000000]}) 00:46:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:53 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c65301e", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:53 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0R') 00:46:53 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:53 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030138a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:53 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x800e0000]}) 00:46:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2726.584608] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:53 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:53 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530f0", 0x0) 00:46:53 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:53 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300afa31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000007fffffff00", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:53 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:53 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x4888]}) 00:46:53 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)="2e2f66696c6530ff") 00:46:53 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653012", &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2726.767219] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2726.775817] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2726.800413] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:54 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000ff00", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:54 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:54 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x88ffffff00000000]}) 00:46:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:54 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030127a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:54 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file00', 0x0) 00:46:54 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') [ 2726.947594] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:54 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:54 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:54 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300f8a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:54 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2f00000000000000]}) [ 2727.050671] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:54 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)="2e2f66696c6530ff") 00:46:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:54 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2727.094276] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2727.102836] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:46:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x10, 0x0, 0x0) 00:46:54 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030078a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:54 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:54 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:54 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:54 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x700]}) [ 2727.198799] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2727.234156] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2727.242689] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:46:54 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000400", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:54 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:54 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='tecurity.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x7c, 0x0, 0x0) 00:46:54 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x806]}) 00:46:54 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece034d01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:54 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='uecurity.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2727.388590] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x2, 0x0, 0x0) 00:46:54 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c65308b", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:54 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:54 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece038a00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:54 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xd00]}) 00:46:54 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='sycurity.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2727.517809] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2727.519235] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:46:54 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x3, 0x0, 0x0) 00:46:54 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='secsrity.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:54 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301dda31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:54 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)="2e2f66696c65308c") 00:46:54 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x3580]}) 00:46:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:54 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:54 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='securisy.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:54 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301fea31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1400, 0x0, 0x0) 00:46:54 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:54 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x3c00000000000000]}) [ 2727.745375] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:54 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:54 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='securite.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2727.813318] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:46:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530cd", 0x0) 00:46:55 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03013ba31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:55 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x806000000000000]}) 00:46:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x3, 0x0) 00:46:55 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security/evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2727.864299] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:55 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:55 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece036201a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:55 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0xffffff8d, 0x0) 00:46:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xd00000000000000]}) 00:46:55 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.yvm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:55 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece033501a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:55 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653012", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2728.036443] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0xfffffff0, 0x0) 00:46:55 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:55 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x1400000000000000]}) 00:46:55 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300d0a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:55 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2728.170655] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x100000000000000, 0x0) 00:46:55 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:55 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:55 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000400", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2728.253533] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2728.262096] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:46:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x21000000]}) 00:46:55 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766d06", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x700000000000000, 0x0) 00:46:55 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:55 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2728.346904] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:55 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030126a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x2000000, 0x0) 00:46:55 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\a', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x84ffffff]}) 00:46:55 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:55 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03cf00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:55 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)="2e2f66696c6530ff") [ 2728.508803] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:55 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766d04", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:55 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x3000000, 0x0) 00:46:55 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03fb01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:55 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)="2e2f66696c653093") 00:46:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x43050000]}) [ 2728.621878] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value [ 2728.644881] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:55 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:55 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:55 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x300, 0x0) 00:46:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x21]}) 00:46:55 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300dda31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2728.721776] XFS (loop3): Invalid superblock magic number 00:46:55 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)="2e2f66696c653004") 00:46:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:55 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:56 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300b3a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x700, 0x0) 00:46:56 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)="2e2f66696c653002") 00:46:56 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x300]}) 00:46:56 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653004", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2728.860084] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:56 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:56 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece032701a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000100", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:56 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x8dffffff00000000, 0x0) 00:46:56 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)="2e2f66696c6530fe") 00:46:56 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030099a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:56 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2900]}) 00:46:56 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2729.020606] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2729.056499] XFS (loop3): Invalid superblock magic number 00:46:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:56 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:56 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03015da31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0xf0ffffff00000000, 0x0) 00:46:56 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000200", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:56 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8100000000000000]}) 00:46:56 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766d8b", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:56 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:56 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03014ca31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2729.210561] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x7000000, 0x0) 00:46:56 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:56 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:56 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x89ffffff00000000]}) 00:46:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:56 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03001ba31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x8dffffff, 0x0) 00:46:56 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:56 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x22800, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000880)='cgroup.controllers\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000600)={0x0, 0xfffffffffffffff9, 0x5, 0x1, 0x1}, &(0x7f0000000640)=0x14) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0xfffffffffffffd0b, "9daacc559bb7089f85002545354ee6b5bf6b5b826eeaa7736c174c1d34f1bb575bd67b876386d2f9965236cb7c04126dd9d4822946d7da4a75cbc6321bcb404767384414e8c434c4d51b8f8329f9413e6f1e530b6540f1f1840f65e157f3245fb398840132ee417f9362130d00407f5f8d872595461a6777b28cdd1f48c16e72ae9af8b9deeb259945348b79f03a02b43dc748795935ea9e0e065ea8ca0d827a9facbc589bcee21c02"}, &(0x7f0000000800)=0xb1) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000006c0)={r2, 0x8}, &(0x7f0000000700)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000003c0)={r3, 0xbfcb}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000005c0)={r3, 0x52f, 0x5, [0x80000000, 0x8001, 0x120000, 0x0, 0x7]}, 0x12) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000380)={0x7, 0xfff, 0x0, 0x4, 0xd000000000000000, 0x1ff, 0x5, 0x200, r4}, &(0x7f0000000440)=0x20) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) lsetxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=@known='com.apple.FinderInfo\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2a, 0x0) unlink(&(0x7f0000000000)='./file0\x00') llistxattr(&(0x7f0000000480)='./file0\x00', &(0x7f0000000500)=""/147, 0x93) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000240)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000340)={r5}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000840)={&(0x7f00000002c0)='./file1\x00', r0}, 0x10) 00:46:56 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766d03", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:56 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300b8a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2729.399285] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x10000000, 0x0) 00:46:56 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:56 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:56 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') socketpair(0x3, 0x2, 0x5, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) inotify_add_watch(r2, &(0x7f00000002c0)='./file0\x00', 0x1) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x6000, r0, r1, 0x66, 0x0, 0x40820) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:56 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03d601a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:56 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x1100]}) 00:46:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x7, 0x0) 00:46:56 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:56 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2729.545589] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000007fff", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:56 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece033600a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:56 executing program 0: stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000340)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0x81a0ae8c, 0xa07000) unlink(&(0x7f0000000000)='./file0\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x20400, 0x0) 00:46:56 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x543]}) 00:46:56 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2729.668411] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:56 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x10, 0x0) 00:46:56 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03c601a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2729.724322] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:46:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:56 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x71fa, 0x24441) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffff}, 0x111, 0x2}}, 0x20) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000480)={0x0, 0x58, &(0x7f0000000400)=[@in6={0xa, 0x4e23, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0xffc6}, @in={0x2, 0x4e20, @broadcast=0xffffffff}, @in6={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0xfffffffffffffffe}, @in={0x2, 0x4e21, @multicast1=0xe0000001}]}, &(0x7f00000004c0)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000500)=r2, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x3, r1, 0x1c, 0x1, @ib={0x1b, 0x6, 0x0, {"adcf2117fca11a4ad4fc3b0d1336dc6e"}, 0xfd1, 0x8, 0x1}}}, 0xa0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000540)=0x7, 0x4) 00:46:56 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x1c]}) 00:46:56 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653002", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\b', 0x0) 00:46:57 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:57 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03000ea31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x1000000000000000, 0x0) 00:46:57 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x81, 0x2000) unlink(&(0x7f0000000000)='./file0\x00') 00:46:57 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x3a00000000000000]}) [ 2729.858740] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:57 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530f6", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:57 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x200000000000000, 0x0) 00:46:57 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030050a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:57 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653010", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:57 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xffff0000]}) 00:46:57 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffff}, 0x106, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000002c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000440)='./file0/file0\x00') get_thread_area(&(0x7f0000000000)={0x9f5d, 0x20101000, 0x1000, 0x88, 0x6ca, 0xe088, 0x55, 0x7, 0xf7b, 0x1}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000380)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', r0}, 0x10) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000340)={0x9, 0x100000000, 0x2, 0xffffffffffffffc0, 0x6, 0x1f, 0xfffffffffffffffb, 0xfff, 0x3d35, 0xffffffffffffd386, 0x7fffffff}) 00:46:57 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2730.056688] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:57 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece038401a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x300000000000000, 0x0) 00:46:57 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:57 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x1, 0x15, 0xe0dc, 0x7f, "1567fd2c9a32e43e7f705260808048fa5315f28d3b2e2f0bb394870ea58b7502"}) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:57 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x3c000000]}) 00:46:57 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:57 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03c701a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:57 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:57 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x89060000]}) 00:46:57 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0&', 0x0) 00:46:57 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766dff", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0xf0ffffff, 0x0) [ 2730.249178] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:57 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece036e01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:57 executing program 0: stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x7f, 0x200002) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f00000003c0)={"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"}) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000280)={0x7b, 0x0, [0x3f, 0x8, 0x1, 0x1]}) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') accept$unix(r0, &(0x7f0000000d40)=@abs, &(0x7f0000000a00)=0x6e) lsetxattr(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="73656375726903793e939d283e0b25999e2851ee0dad382530026974795c6c54757365725e3a6264656497050000000000005fd603893658846ece913c5237d768fa2c63059462f1d1ed5a68f51443154a25fe5dbd07216a7499eab5d627758337c827701bf515790e63976289e6995eedbe2371f2515e6ed4276512f582d054b13fb2e666fd682bd41db4715c94d63364fa49c997a90ef8540c25b42cd54d30010bc7b38eab12e1fc10bca34cf1013f8b86519d"], &(0x7f0000000140)='mime_type.cpuset\x00', 0x11, 0x0) unlink(&(0x7f0000000a40)='./file0\x00') getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000007c0)={0x0, 0x1, 0x3, 0xffff, 0x2, 0xffffffffffff7336, 0xb07, 0x81, {0x0, @in6={{0xa, 0x4e20, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x3f}}, 0x6, 0x3f, 0x6, 0x9, 0x1}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r2, 0x2}, &(0x7f0000000880)=0x6) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0xb19a, 0x2, &(0x7f0000000100)=[{&(0x7f0000000a80)="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", 0xfd, 0x5}, {&(0x7f0000000b80)="b91591b487f42a6d7b162a4f8773b8242269c0dc2a5a8ea421463a37906132f99e5e108789547f64fdda7e66fd1acffe82f07f960b8645de253925e7329f597270bd7f8482e6cfdbf8cbc17b94bdde689ac9fd240f16f2969862f358df25a4833b2f8f532656383ac0fee2b33dc9e35494ec830411812dea7cb930e174c864f0d829ac175716bfdad0c117e2c04f633c1e48d35480c47b07bcda02884a389c65824f656384a9cb00e5914a931c5efe", 0xaf, 0xe254}], 0x20, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000c40)) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000008c0)={r1, 0x2, 0x6, 0x2, 0x2be, 0x6, 0x8001, 0x6, {r3, @in6={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x6}}, 0x6, 0x0, 0x2, 0xfffffffffffffffc, 0x80}}, &(0x7f0000000980)=0xb0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000001c0)=0x7ff, 0x2) 00:46:57 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8848]}) 00:46:57 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:57 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm(', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x2, 0x0) 00:46:57 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301fca31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:57 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x1, r1}) 00:46:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2730.425288] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:57 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:57 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766df6", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:57 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2f]}) 00:46:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x1000000, 0x0) 00:46:57 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300e4a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:57 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000003c0)) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x2004000, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e733d756e697866646e6f3dfe3d36302d3f3b2c7766646e6f3d3732372c6d6d61702c6c6f6f73652c63616368653d667363616368652c63616368653d6e6f6e652c667363616368652c6163636573733d002c0000000000000000000000"]) 00:46:57 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301ffa31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2730.588210] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:57 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\r', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:57 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x29]}) 00:46:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000040)="ff98657653ee957a3e8a8d8cd1b3d652fbeed5ae939e62680273462a2c273ff2a8c8915890f4c736808bb1d8f281ede8b87328d560530bd24033f6c8838280") recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:57 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:57 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x8000, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000180)=0x5, 0x2) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') [ 2730.716780] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:57 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece038c01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/rt_acct\x00') close(r2) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:57 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:57 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766de0", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:57 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xffff000000000000]}) 00:46:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:58 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') unlink(&(0x7f0000000000)='./file0\x00') r0 = semget$private(0x0, 0x0, 0x0) semctl$GETVAL(r0, 0x3, 0xc, &(0x7f0000000340)=""/4096) r1 = open(&(0x7f0000000080)='./file1\x00', 0x4000, 0x8) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000001340)=""/167) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000180), 0x2) [ 2730.865193] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:58 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:58 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000280)={@pptp={0x18, 0x2, {0x1, @remote={0xac, 0x14, 0x14, 0xbb}}}, {&(0x7f0000000100)=""/67, 0x43}, &(0x7f0000000040), 0x20}, 0xa0) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:58 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03e801a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:58 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2b000000]}) 00:46:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2730.930478] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:46:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:58 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200400, 0x0) mount$9p_unix(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x800000, &(0x7f0000000380)={'trans=', 'unix', 0x2c, {'port', 0x3d, [0x3f, 0x78, 0x30, 0x3f, 0x33, 0x3b]}, 0x2c, {'rfdno', 0x3d, [0x36, 0x38]}, 0x2c, {'wfdno', 0x3d, [0x30, 0x38, 0x38]}, 0x2c, {[{@privport='privport', 0x2c}, {@uname={'uname', 0x3d}, 0x2c}]}}) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000180)) 00:46:58 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece032700a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:58 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766dff", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3f, 0x0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x12c0) write$cgroup_pid(r1, &(0x7f0000000100), 0x0) ioctl$KVM_NMI(r1, 0xae9a) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) listen(r1, 0x4) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:58 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c6530ff", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:58 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x4788]}) [ 2731.053390] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="2577d0c42a1ce27591670bb1472b5da4dadc0111b32eb3fa05de22668580940408edab55859f652abebb9bc6bb00a33064238da75380df8f18152d758527c191f98c52cfdbc6b1b65e605dd838fed5a1d63417bafe70b754a1d98d44b5f19a7a48f2f21d037fffc802dd61480b4b0e4ce7c1ac161bb76240b45e33fe9f237dda6eb50c11f22d5a996833bf2ebc5088d0d22953042c0139f9fed740c012131e58d441792a1aad4379d99cc1584d10cfa11c3bc509bf8ed5cbd99fb4c6cda19dac3197d8691a9ea020d7d498e1fe293e00cc86469c1c737b6adf40d168ce50ce1287f8c4b95b6b0a1036aa3f9628a47188d6ad2c25876b", @ANYPTR, @ANYRES16=r1, @ANYRES16=r1, @ANYBLOB="819236991cf15594c584ee63acbd7d02530e966fa0110b7315265bd5"], 0x11e) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x51, 0x4) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$rds(r2, &(0x7f0000000740)={&(0x7f00000003c0)={0x2, 0x4e21, @multicast2=0xe0000002}, 0x10, &(0x7f0000000400)=[{&(0x7f00000004c0)=""/209, 0xd1}], 0x1, &(0x7f00000007c0)=[@rdma_dest={0x18, 0x114, 0x2, {0x6000000000000000, 0xba}}, @mask_fadd={0x58, 0x114, 0x8, {{0x3, 0xf7b6}, &(0x7f00000005c0)=0x80000000, &(0x7f0000000600)=0x9, 0x62, 0x4, 0x7fff, 0x1, 0x40}}, @rdma_dest={0x18, 0x114, 0x2, {0x100, 0x94eb}}, @mask_cswp={0x58, 0x114, 0x9, {{0x5, 0x8}, &(0x7f0000000640)=0xbbdd, &(0x7f0000000680)=0xbd44, 0x58, 0x8, 0xc2b, 0x7, 0x40, 0x7}}, @rdma_dest={0x18, 0x114, 0x2, {0x5, 0x2}}, @cswp={0x58, 0x114, 0x7, {{0x80000001, 0x16}, &(0x7f00000006c0)=0x8, &(0x7f0000000700)=0x1, 0xfffffffffffffff7, 0x7, 0x3ff, 0x995, 0x0, 0x200}}], 0x150, 0x4000000}, 0x24000010) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:58 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030107a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:58 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:58 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:58 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) syz_mount_image$vfat(&(0x7f0000001800)='vfat\x00', &(0x7f0000001840)='./file0\x00', 0x3, 0x1, &(0x7f0000001900)=[{&(0x7f0000001880)="47f7d612802913da67f68954b882eda902cae84cfab7ad341a15cfeb692c18186731d7da274162d2f954e6d2cd43f8cafc38857ad2c6c9733df6ec9bb9243e99fc", 0x41, 0x40}], 0x1000000, &(0x7f0000001940)={[{@uid={'uid', 0x3d, [0x32]}, 0x2c}]}) unlink(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f0000000340)='./file1\x00', 0x80, 0x20) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='v/\x00'], &(0x7f00000002c0)='+]\x00', 0x3, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x107000, 0x0) syz_mount_image$ceph(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)='./file0\x00', 0x2, 0x6, &(0x7f0000001700)=[{&(0x7f0000000480)="18a3a980de91368164a452eb5753efedc5d479b0155744e8d4264ed5788d769c6169a25335feb8b3d2a06989ddcffb87f2fc3365f06ea0153833dbd290b666e74369b98635304c0eb42eda0a94b781432b87601f66d9a45841e6a8415a2b8f6df583d9eb9c010a02522109dd1d91c6e5e0", 0x71, 0x1}, {&(0x7f0000000500)="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", 0x1000, 0x7fffffff}, {&(0x7f0000001500)="7252f925d6b9af", 0x7, 0x44e}, {&(0x7f0000001540)="d276435eb1", 0x5, 0x7f}, {&(0x7f0000001580)="6a880ca1249f5035d735bd5a4b3006ac2e3c6d9120b9330f83094373796b3913f6f68af7bd330e0710857cb766cfe4d400f91addb83d8873642dba332f7e331608f13b459c204e4c5dada757842c1cff1647c5fb691eac42f1f34d8fe7d4b088e72f7a9863eb79088477def8ddb7e1cefc0d50bee0a327e5992bacda9e4bd751ab396ca880dd93e9773df80773cfa126c9dc961db2c1908864a69b17df0f8b367b911897b6cc222f3553", 0xaa, 0xff}, {&(0x7f0000001640)="8502656147cb0c4d4586094fca80955d5068b108a6cff65f00cc5216549b113c3d43b874129a1b64b5666df17630b4a2c77d57bdc6baee1ded5cef937d06ad7882559e0b1c10ba26d6ea9d7c5de88f838000c8c13a6f5e17349021a2493914b4b6195f2238792ad4d8f322af4b48ae564137a89b73da42203bbacd078266c2c1b44a7df7041b3135b4b00d59df0310a9acb0563690329d2ef7ebe88f87bc639b84a05384103f1f674ce9b63038530cc2f5", 0xb1, 0x9}], 0x4000, &(0x7f00000017c0)='+.\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file2\x00', r0}, 0x10) 00:46:58 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8035]}) [ 2731.207532] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:58 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030145a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x3ff8000000000000, 0x7, 0x9000}, 0x4) socket$xdp(0x2c, 0x3, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r2 = accept$alg(r0, 0x0, 0x0) r3 = getuid() ioctl$TUNSETOWNER(r2, 0x400454cc, r3) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:58 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:58 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766dff", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:58 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) accept(r0, &(0x7f0000000280)=@xdp, &(0x7f0000000180)=0x80) unlink(&(0x7f0000000000)='./file0\x00') 00:46:58 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8000000]}) 00:46:58 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)="2e2f66696c653001", &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:58 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece035e01a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2731.360353] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2731.371160] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:46:58 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766de0", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000100)=@pptp={0x0, 0x0, {0x0, @multicast2}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/161, 0xa1}, {&(0x7f0000000340)=""/186, 0xba}, {&(0x7f0000000400)=""/46, 0x2e}], 0x3, 0x0, 0x0, 0x2}, 0x40) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)={0x1, [0x1]}) ioctl$KVM_SET_CPUID(r5, 0x4008ae8a, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000000d0000400500000005000000000100000000004000000000010000000000000025000000ffffffff00040000000000000a00000006"]) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x38d, 0x0, 0x2}]}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/audio\x00', 0x201, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r6, 0x4040aea4, &(0x7f0000000580)={0x7ff, 0x5, 0x4, 0x1, 0x3}) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f00000005c0)=[@in6={0xa, 0x4e22, 0x61b8, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, @in6={0xa, 0x4e23, 0x28, @mcast1={0xff, 0x1, [], 0x1}, 0x7fff}, @in6={0xa, 0x4e20, 0x1, @mcast2={0xff, 0x2, [], 0x1}, 0xfffffffffffffff8}, @in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}], 0x64) r7 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x400200) ioctl$TIOCLINUX6(r7, 0x541c, &(0x7f0000000040)={0x6, 0x1ff}) 00:46:58 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f0000000080)="73656375726974794c6c6f753171a66d655f74797065272d2f70726f6300000000000000000000000000", 0x5b, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:58 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530f0", 0x0) 00:46:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:58 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03018ca31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:58 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766dff", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:58 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='tecurity.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:58 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x600000000000000]}) 00:46:58 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') unlink(&(0x7f0000000280)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x100, 0x0) mknodat(r2, &(0x7f0000000380)='./file0\x00', 0x7088, 0x1) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) r4 = dup3(r1, r3, 0x80000) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f00000002c0)={0x303, 0x33}, 0x4) [ 2731.517882] kvm_pmu: event creation failed -2 [ 2731.522822] XFS (loop3): Invalid superblock magic number 00:46:58 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766dff", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:58 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece032001a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2731.588427] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:58 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x800000000000000]}) 00:46:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0xfffffffffffffe2e}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:58 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='uecurity.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:58 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='sycurity.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:58 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x3, &(0x7f0000000540)=[{&(0x7f0000000280), 0x0, 0x5}, {&(0x7f0000000340)="abc309104355005a75cdc1076588fba79f2dc9b3bb84d8f673134fc644c541d023b279ed9b3ea1d5c466b7ba35c204ac541bf890a60a5ba9ad2b4289e534137f5d3d64a5b92dc7dfa788147977a3be95fd3ab9e16cd0d75d7e330571fed1020bb0948e48b4a04fa9ee7c096c7e1afba0d149d6692067b9acd9af08089ae155a3c0f90e8ea653a44f9415b819d8f1f1485c9df3e928ce1fd21260b389e4a149e049a5223866a21644e42e234605a6e948cdfc9b4ea5fb899ccb781ce4bc4ed0e54666058bbdd1b1fcb1832a25f0111ae738403e8a4ff1a520ba3768bb3867", 0xde, 0x2}, {&(0x7f0000000440)="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", 0xff, 0x2}], 0x4, &(0x7f00000002c0)) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000005c0)={0x0, 0x8, 0x1, 0x1, 0x5, 0x1}, &(0x7f0000000600)=0x14) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000640)={r1, 0x500}, &(0x7f0000000680)=0x8) 00:46:58 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:58 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030095a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:58 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\r', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:58 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x700000000000000]}) 00:46:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x8, 0x4) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2731.767418] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2731.795518] nla_parse: 16 callbacks suppressed [ 2731.795527] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2731.808652] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:46:58 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x2, 0x8000) ioctl$RTC_WIE_OFF(r0, 0x7010) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:59 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='secsrity.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:59 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/mnt\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000340)={0x0, 0x401, 0x8}, &(0x7f0000000380)=0x8) fremovexattr(r3, &(0x7f0000000400)=@random={'os2.', 'ns/mnt\x00'}) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000003c0)={r4, 0x5}, 0x8) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x605f062287e619f0, 0x8000}, 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCOUTQ(r6, 0x5411, &(0x7f00000002c0)) r7 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r7, &(0x7f0000000040)=ANY=[@ANYRES16=r5, @ANYRES64=r5], 0xa) recvmmsg(r7, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:59 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=@known='security.evm\x00', &(0x7f00000000c0)="73030075726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f6300", 0xfffffffffffffc28, 0x0) unlink(&(0x7f0000000000)='./file0\x00') openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x183202, 0x0) 00:46:59 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x84ffffff00000000]}) 00:46:59 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='securisy.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:59 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:59 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030160a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2731.954162] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2731.962282] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:46:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:59 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') prctl$setfpexc(0xc, 0x2) 00:46:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x20000000402, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000040)=0x6) 00:46:59 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='securite.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:59 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03f201a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:59 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:59 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x6000000]}) [ 2732.111980] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:59 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:59 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security/evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:59 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece031500a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept(r0, &(0x7f0000000000)=@in={0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x80) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000300)=0x14) accept4$packet(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000004c0)=0x14, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000600)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x5000}, 0xc, &(0x7f0000000640)={&(0x7f00000007c0)={0x1d0, r2, 0x300, 0x70bd2d, 0x25dfdbfc, {0x1}, [{{0x8, 0x1, r3}, {0x1b4, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x40}}, {0x8, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xffffffff}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x24, 0x4, [{0xa9, 0x1, 0x80000000, 0x8001}, {0x3, 0x8, 0x1000000000000000, 0x5}, {0x3, 0x8001, 0x1, 0xad7d}, {0x1f, 0xffffffff, 0xfff, 0x3}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xfffffffffffffff9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x804}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(0xffffffffffffffff, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:59 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r1, 0x100, 0x19f2cb1a}, &(0x7f00000002c0)=0xc) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:59 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x1c00]}) 00:46:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:59 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2732.212107] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value [ 2732.248847] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:59 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03c901a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:59 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.yvm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000005c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab02569edc21f18300a3ebbdbc894e3bda7e6f265f58d7483a157b26a92429242c1eb18af2397d1927603737b89bb4262e46faf7cc65b904838b426dc38a1c8ee1202a42a226719e7f78ad2e57c1f78c1595c1b26727356153f01f9bbab88ffaae28feae245fc79e7d7bda3f0a3926b28d1380419bcc989661ba09d67ce9e936d16fd00a16e8b03a162bef6b18a176c2560d90fcc199ef1fb3db06c3d865b3578ecb386b73816adfc50cf00106ac04063f9588bcf535abfe0dba904da71e23e6b39644f898732d43bd2", 0xfffffce4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:59 executing program 0: stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:59 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766dff", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:59 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:59 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2b]}) [ 2732.395423] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value [ 2732.412752] kernel msg: ebtables bug: please report to author: Wrong len argument 00:46:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:46:59 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece035501a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:59 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766d01", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:59 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:59 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = request_key(&(0x7f0000000080)='.dead\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)='\x00', 0xfffffffffffffffb) r1 = add_key(&(0x7f00000002c0)='trusted\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r1) 00:46:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfffffda8, &(0x7f0000000280)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0xfffffffffffffcf2, &(0x7f0000000100)}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:59 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03b600a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:59 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8060000]}) 00:46:59 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766d06", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:59 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766de4", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:59 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2a, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:46:59 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece037400a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2732.641224] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2732.649723] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:46:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x2c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:46:59 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x14000000]}) 00:46:59 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c65301a", 0x0) 00:46:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:46:59 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x402, 0x0) r1 = getpid() capget(&(0x7f0000000000)={0x20071026, r1}, &(0x7f00000002c0)={0x1, 0x101, 0x0, 0x2, 0x1, 0x4000000000000000}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) renameat2(r0, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00', 0x1) stat(&(0x7f0000000340)='./file0\x00', &(0x7f00000001c0)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f00000003c0)='./file0\x00') 00:46:59 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:46:59 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300a4a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:46:59 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:46:59 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2c00]}) 00:47:00 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2732.794075] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000000)=0x2, 0x4) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x4000) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000100", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2732.859975] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2732.868578] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:00 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') epoll_create1(0x80000) unlink(&(0x7f0000000000)='./file0\x00') 00:47:00 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:00 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece033301a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:00 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:00 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x689]}) [ 2732.943876] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=""/143, 0x8f) 00:47:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:00 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80000, 0x0) fsync(r0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000180)={0x8cb, 0xc, [0x1, 0x80, 0x5]}) unlink(&(0x7f0000000000)='./file0\x00') 00:47:00 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece037e00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:00 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766de4", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:00 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:00 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2b00]}) [ 2733.091450] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:00 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuseblk_mount(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, r0, r1, 0x10a6, 0x9, 0x5) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000180)=0xffff) ioctl$sock_bt_hci(r2, 0x400448c9, &(0x7f0000000500)="66d0b7bf791b008fb633c68001a616907f610b7f943d62082ab03ffe6c9827c2ab2c08aa94338ca030e34b45dabadc3f242ec84dc1c12f59851813db418675d086317c6b98e419ac9587f39ce6ed78d1f2f4f738da835356c0978cde3be8759c584845") 00:47:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:00 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766d10", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:00 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) clock_gettime(0x3, &(0x7f0000000080)) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000001500)=ANY=[], 0x4cba) splice(r0, &(0x7f0000000000), r1, &(0x7f0000000040), 0x8, 0x6) r2 = syz_open_dev$usbmon(&(0x7f0000000440)='/dev/usbmon#\x00', 0xffffffffffffffe1, 0x40000) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000480)={0x7, {{0x2, 0x4e20, @loopback=0x7f000001}}}, 0x88) 00:47:00 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:00 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece032900a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:00 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8864]}) [ 2733.236644] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:00 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[@ANYRES16, @ANYPTR64, @ANYRES16=0x0, @ANYRES16=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="ea64506ce0c7011b5049ad32dac1447b79001113bc01497dbabc1f79ec775b86442839bebf753ce965d09654bc05d97adaccd8cb0cfd04bb71549f10cc81634737ba258627066aaa2f06f62978f2269ea7c27f76ccb1b7df14fab76ef2c543af0cb4a8a9831da67add3216e85af1"], 0x84) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:00 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:00 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03ad01a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2733.296855] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:00 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:00 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x284000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0xfff}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x800, 0xfffffffffffffbc1, 0x9, 0x5, 0x1}, 0x14) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000001500)=ANY=[], 0x4cba) open(&(0x7f0000000280)='./file0\x00', 0x88240, 0x400000) recvmmsg(r3, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2733.393750] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:00 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece034c01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:00 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x1400]}) 00:47:00 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=@random={'os2.', 'system(posix_acl_access\x00'}, &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2a, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:00 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:00 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(arc4-generic)\x00'}, 0x58) 00:47:00 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece036401a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:00 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530ff", 0x0) 00:47:00 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x41f5801009e46bb7, 0x18) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x2, 0x4}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000002c0)={r1, 0x3f}, 0x8) [ 2733.554353] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:00 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03d500a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:00 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:00 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\f', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:00 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x88a8ffff]}) 00:47:00 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000180)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f0000000480)="73656375726974795c6c5d757365725e3a6264657629656d316d696d655f74797065272d2f70726f6300943d11fa1f34ca18677f35168f92cfeb2d13b693468217486e1df4fc0d11f5d24c98d4eafd0700f2a40917f044ffcb40c00cf9c047a22dae7f07d430bf51303f6cea88614b3d49e97ed2d5a6c215c0ccaa109a65410fce2843a05848ff0f816bd7721f829eb02c4f22b0305dbe6c6f784cd019c441b3e8f7eb320eb42b3e848c2a09dec963a42755fad1ac4a993c7da90558cd18d031af", 0xc1, 0x0) unlink(&(0x7f0000000000)='./file0\x00') setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000400)=0x8, 0x4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000280)=""/104, &(0x7f0000000340)=0x68) symlink(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00') 00:47:00 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece037001a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:00 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766d02", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2733.737948] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:00 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000280)=""/91, &(0x7f0000000180)=0x5b) unlink(&(0x7f0000000000)='./file0\x00') 00:47:00 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x5, 0x0, 0x80000001}, {0xfffffffffffffff7, 0x8000, 0xbdff, 0x8000}, {0x2, 0xffffffffffffab2c, 0x1, 0xffff}, {0x8000, 0x2, 0x6, 0x100000001}, {0x1, 0x7, 0x2, 0xe7f}, {0x1, 0xff, 0x8000, 0x10000}]}, 0x10) 00:47:01 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x800e]}) 00:47:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000000ff00", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:01 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03007fa31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:01 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766d10", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:01 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x181040, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000180), 0x4) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x8000) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) setfsuid(r1) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000480)={'nat\x00', 0x0, 0x4, 0xab, [], 0x1, &(0x7f00000002c0)=[{}], &(0x7f00000003c0)=""/171}, &(0x7f0000000340)=0x78) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000001540)={'nat\x00', 0x0, 0x4, 0x1000, [], 0x3, &(0x7f0000000500)=[{}, {}, {}], &(0x7f0000000540)=""/4096}, &(0x7f00000015c0)=0x78) unlink(&(0x7f0000000000)='./file0\x00') 00:47:01 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766df6", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:01 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:01 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:01 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300aea31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2733.950125] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2733.951715] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2733.966334] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:01 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'\x00\x00\x00\x00oc\x00', 0x2a, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x5, 0x10000) execveat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000480)=[&(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'\x00\x00\x00\x00oc\x00', &(0x7f00000002c0)='/\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='cgroup/ppp0)\x00', &(0x7f0000000400)='-\'systemppp1\x00', &(0x7f0000000440)='{&-md5sum\x00'], &(0x7f00000006c0)=[&(0x7f00000004c0)='^system%&\x00', &(0x7f0000000500)='security.evm\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='security\\louser^:bdev)em1mime_type\'\x00\x00\x00\x00oc\x00', &(0x7f00000005c0)=']\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='security\\louser^:bdev)em1mime_type\'\x00\x00\x00\x00oc\x00', &(0x7f0000000680)='eth1.vboxnet1bdev[[cgroup)+security^\x00'], 0x800) 00:47:01 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766dff", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000ff00", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:01 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x600]}) 00:47:01 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x200000, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000340)={0x303, 0x33}, 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x20000, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)=0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000280)={[], 0x1000, 0xfffffffffffffffb, 0x10001, 0x20, 0x3800000000, r4}) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2000, 0x0) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x30e, 0x2, 0x400, 0x3ff, 0x4236, @random="52e7496409f4"}, 0x10) write$binfmt_aout(r5, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x68e) [ 2734.046038] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2734.054630] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:01 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:01 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03d401a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:01 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x80082, 0x10000000020) 00:47:01 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766dff", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2734.143883] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value [ 2734.144120] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:01 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x88470000]}) 00:47:01 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece033b00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:01 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:01 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = dup(0xffffffffffffffff) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x78) unlink(&(0x7f0000000000)='./file0\x00') 00:47:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000100)="f4b0f9529a8ca08bbbd5aa4648bef8ff92560d61a4636f7ac3a3e353e1da479b92e51145d2df633252add828cdbf271212545eaa0c6bb2b1c3ecf4e82b2161de003c0716b480537172ade701a6d3f947b0beab144d053f72e37f102cbf99bb3499a8482be7c1c0d952372e59243871b7") bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r2 = accept$alg(r0, 0x0, 0x0) flock(r0, 0x6) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000280)=0xc) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000002c0)=r3) 00:47:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:01 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030137a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:01 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2100]}) 00:47:01 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:01 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:01 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='jfs\x00', 0x4, 0x0) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2a, 0x3) unlink(&(0x7f0000000000)='./file0\x00') r0 = semget(0x1, 0x3, 0x200) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x5, 0x6, 0xce, 0x7, 0x8, 0xfffffffffffffff9, 0x6, 0xfffffffffffffffa]) 00:47:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) semget(0x1, 0x1, 0x200) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x1a9) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:01 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766df0", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:01 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece038b00a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2734.372600] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:01 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x29000000]}) 00:47:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:01 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766d01", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:01 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') [ 2734.460545] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:01 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03d600a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:01 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) r2 = memfd_create(&(0x7f0000000000)='seqiv(rfc4543(gcm(aes-generic)))\x00', 0x2) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e22, 0xff80000000000000, @loopback={0x0, 0x1}, 0x3d}, {0xa, 0x4e24, 0x92, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x2, [0x7, 0x4, 0x8, 0x20000000, 0x1, 0x1, 0x7ff, 0x2]}, 0x5c) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:01 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766df0", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:01 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030019a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2734.562890] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:01 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x88caffff00000000]}) 00:47:01 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='/\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:01 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0b9c410d26a597fb76c2c9ab2689785913f2a20f5484b59619173ba92a529cc0df8b2a6737d1cf97755b04025b2c05a12a6952ec0fa14341d131eec2ddbc0efd16841227394a3504e706f8d8f188650cf8fb3094701b7b6f3b5383c1dc9dbedee1efcfe1ff22b6232af64b991538837689e5689d5c9015c634e4", 0x7a) 00:47:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2734.661861] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2734.670424] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:01 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:01 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece035801a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:01 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:01 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x4000000]}) [ 2734.736935] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0xfffffca0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="d179f206c009cb1c", 0xfffffe14) r1 = dup(r0) openat$cgroup_procs(r1, &(0x7f0000000040)='=grad{\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x4, 0x7ff}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={r3, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0xfffffffffffffffc, 0x5, 0x9, 0x3, 0x56}, 0x98) sendto$inet(r2, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r2, &(0x7f0000000000)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r2, 0x1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x74, &(0x7f0000000080)={0x0, 0x0, 0x30}, &(0x7f0000000040)=0x18) r4 = accept$alg(r0, 0x0, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f00000001c0)=0x9, 0x4) setsockopt$inet_int(r5, 0x0, 0x23, &(0x7f0000000240)=0x2, 0x4) getsockopt$inet_dccp_int(r5, 0x21, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$binfmt_misc(r4, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r4, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) rmdir(&(0x7f00000004c0)='./file0\x00') 00:47:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:01 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x65f, 0x622001) write$sndseq(r0, &(0x7f0000000280)=[{0xfffffffffffffffb, 0x3, 0xffffffffffffffe0, 0x0, @tick=0x4, {0x7fff, 0x4}, {0x2, 0x4}, @raw8={"cfa9665ac626c1da545231f6"}}, {0xfffffffffffffff9, 0x400, 0x4, 0x7, @time={0x77359400}, {0x4, 0x80000000}, {0x92}, @connect={{0x81, 0xd8b}, {0x7fffffff, 0x4}}}], 0x60) 00:47:01 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03a800a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000400", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:01 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:02 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:02 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2b00000000000000]}) [ 2734.879812] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:02 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300a0a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:02 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:02 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766dff", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:02 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)={0xaa, 0x40}) unlink(&(0x7f0000000000)='./file0\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200000, 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00') ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000180)=0x8) 00:47:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:02 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2734.977882] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:02 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) [ 2735.039636] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2735.157130] XFS (loop3): Invalid superblock magic number 00:47:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x2d) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup2(r0, r0) write$eventfd(r2, &(0x7f0000000000)=0x483c0772, 0x8) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000240)={0x80000000, 0x6, 0x0, [{0x98, 0x2, 0xffff, 0x8, 0x4, 0x7f, 0x4}, {0x80000001, 0x9, 0x400, 0x6, 0xd79, 0x1, 0x20000}, {0x1f, 0x5, 0x1f, 0x3, 0x3, 0x9, 0x7}, {0x8, 0x9, 0xfffffffe0000000, 0x10001, 0x0, 0x3, 0x3}, {0x2f, 0xfffffffffffffa83, 0x101, 0xfff, 0x40, 0x0, 0x3}, {0x2, 0xe7, 0x8000000, 0xffff, 0x9, 0x6, 0x2}]}) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000200)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:03 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766dff", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:03 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:03 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030077a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:03 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:03 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xf0ffffffffffff]}) 00:47:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:03 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:03 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000280)='./file0\x00') 00:47:03 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766d85", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2735.932751] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:03 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030106a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) sched_getattr(r2, &(0x7f0000000280), 0x30, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000000)={'yam0\x00', {0x2, 0x4e23, @multicast2=0xe0000002}}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r3, 0x80045700, &(0x7f0000000100)) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f00000002c0), &(0x7f0000000340)=0x60) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:03 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x81000000]}) 00:47:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000200", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2735.991982] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:03 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:03 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece038801a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:03 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766de0", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:03 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x2, 0x482) accept4$nfc_llcp(r0, &(0x7f0000000280), &(0x7f0000000180)=0x60, 0x800) socket$vsock_dgram(0x28, 0x2, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:03 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x88ffffff]}) [ 2736.113428] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2736.117054] XFS (loop3): Invalid superblock magic number 00:47:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x11, 0x1000, &(0x7f00000007c0)="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"}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="d179f20600000000008600b1048c5b1bd2e7fcd330451c64d95d42d7c470150c985325b8614fcff9671a5cf5d5b4ed", 0xfffffffffffffcb1) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e22, 0x39, @empty, 0x100000001}}, 0x100000001, 0x1}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r3, 0xf1d, 0x9, 0x20, 0x100000000, 0xb5}, &(0x7f0000000340)=0x14) 00:47:03 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766d8c", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:03 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece036c01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:03 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:03 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x3, &(0x7f0000002340)=[{&(0x7f0000000340)="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", 0x1000, 0xc46d}, {&(0x7f0000001340)="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", 0x1000, 0x2}, {&(0x7f0000000280)="f3e400d94530caa598018531ab73a552d0f429237f8eafe055edba10038614213ae369fb12", 0x25, 0x7f}], 0x3ae040, &(0x7f00000002c0)={[{@nointegrity='nointegrity', 0x2c}, {@discard='discard', 0x2c}, {@errors_remount='errors=remount-ro', 0x2c}, {@gid={'gid', 0x3d, [0x35, 0x30]}, 0x2c}]}) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:03 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766d02", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:03 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301f2a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000280)={0xa8, 0x80000000, "94e3ac4882c36bd5e5eb730b7a7912df62cbf6e149d5821fe7e28db27effbaece8dadd1eb7b21ba9938a1b3dd6f01292edc54e4883828adcb2a348ea7ec07ee2f5202f5b8cd4373c1704c9bc5482af5412fafc62c47e27fcd79e94c051b997005c8fe81ace0e1e574c9b704d7dcd97f8a8457867cb76ec506a8e75c6c13fce73f9eed8f470ee282a66cd8e4789a3bd51a38015b9c14d78b63f8f5c05671adb3f"}, 0x0) 00:47:03 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:03 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x80350000]}) 00:47:03 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000080)={0x8}) [ 2736.331971] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:03 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\a', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:03 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03010da31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:03 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x4000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20001}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x120, r1, 0x402, 0x70bd2b, 0x25dfdbff, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local={0xac, 0x14, 0x14, 0xaa}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote={0xac, 0x14, 0x14, 0xbb}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote={0xfe, 0x80, [], 0xbb}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x397d}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x24, 0x4}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local={0xfe, 0x80, [], 0xaa}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xf5fd}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast=0xffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x41ab}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x40081}, 0x24044040) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:03 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x40) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000040)={0x103000, 0x2, 0x1ff, 0x400, 0xe89}) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:03 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:03 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x11]}) 00:47:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:03 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:03 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030199a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2736.521647] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:03 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x100, 0x8000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000340), r1, 0x4}}, 0x18) timerfd_gettime(r0, &(0x7f0000000400)) unlink(&(0x7f0000000000)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}}}, &(0x7f0000000540)=0xe8) socket$inet_smc(0x2b, 0x1, 0x0) 00:47:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0xffffffffffffff73, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:03 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766d12", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:03 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xffffff84]}) 00:47:03 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:03 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030061a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0$', 0x0) 00:47:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000280)={@local={0xfe, 0x80, [], 0xaa}, @dev={0xfe, 0x80, [], 0x17}, @dev={0xfe, 0x80, [], 0xe}, 0x7f, 0x8, 0x9, 0x100, 0x100, 0x80000008, r3}) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) ioctl$TCSBRKP(r2, 0x5425, 0xfffffffeffffffff) recvfrom(r2, &(0x7f0000000300)=""/69, 0x45, 0x40, &(0x7f0000000380)=@ipx={0x4, 0x0, 0x3, "7882842728fa", 0x9}, 0x80) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:03 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x40000, 0x0) syz_fuse_mount(&(0x7f0000000240)='./file1\x00', 0x0, r0, r1, 0x7646644e, 0x2024002) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x2, @mcast2={0xff, 0x2, [], 0x1}, 0x1000}, 0x202) sysfs$3(0x3) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file1\x00') openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x10080, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'user.', '\x00'}, &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2a, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:03 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:03 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2736.709407] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:03 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300b6a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:03 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xf0]}) 00:47:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000000007f", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:04 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:04 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\r', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:04 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)) [ 2736.814140] nla_parse: 6 callbacks suppressed [ 2736.814149] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2736.827279] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:04 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03a901a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2736.882811] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000200", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:04 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm@', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:04 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x608]}) 00:47:04 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000640)='/dev/audio#\x00', 0x8001, 0x202000) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000680)={'filter\x00'}, &(0x7f0000000700)=0x54) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="d120fb5adf574d5979f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9", 0xa5) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0xfffffffffffffcb6) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000400)) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x2, &(0x7f0000000140)=[{&(0x7f0000000280)="5f49c605afd771053480fbc3bdcc73b30a36d531356d6ea014cc250f8af3d43f6901f23f6dd7b2ae7c3385f5617b24bab039ff6e731dfe1a79c3155693e44f946a02f782bd4dedc3aeb5064a950d72b13609dd5eb85d9de2ae649a8bd1d5b0a1b15ef68df49bc8550eee1cd6f8c32f7edef14b5b1037a528b591be73b3f8f168e2aa07195ea19587869faff7bbe3ba157fbbe68c3fae7493", 0x98, 0x8}, {&(0x7f0000000100)="de1d04400cd22c4812af4eeefd481ae7765eda548133fdbd55cbb187aeb0e475ad656bb1b7f5374d05bc4ee844c20ea18f7c7db418a70c433c187d", 0x3b, 0x401}], 0x8008, &(0x7f0000000340)='aead\x00') recvmmsg(r2, &(0x7f0000000380)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) memfd_create(&(0x7f00000003c0)='vboxnet0keyring[\x00', 0x2) 00:47:04 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766de0", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:04 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:04 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece033c00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:04 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:04 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm(', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2737.033457] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2737.046850] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value [ 2737.067989] ceph: device name is missing path (no : separator in /dev/loop4) 00:47:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000007fffffff00", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:04 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x88caffff]}) 00:47:04 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301bca31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:04 executing program 0: stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x414601) getsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) renameat(r0, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f00000002c0)='./file0\x00') 00:47:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:04 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766dfe", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:04 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03e400a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2737.171670] ceph: device name is missing path (no : separator in /dev/loop4) [ 2737.195951] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000100)={0x4, 0x0, [{}, {}, {}, {}]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r2 = accept$alg(r1, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:04 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:04 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:04 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8864000000000000]}) 00:47:04 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000400", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) ioctl$FICLONE(r0, 0x40049409, r0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:04 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03019ea31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0%', 0x0) 00:47:04 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000400)={0x0, 0x1}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000480)={r1, 0xb9, "091822bd7198c44fa2f5fb3bdd21dbbd66499f0c954f683a9553aa5d237c6a7fbfd3066cf6c2c06a8ed8b7943a82fb870b840390e2b73ed9df6ab774859f3d42a08fb54389f18941ed1a28c9f52e0b3d7c59fae37c96a112f70f5028edf54173a3e2f409a667363a784f5450a028aa7b2c7b633dc19e7cc625a6adef4e385d079157e3605fbd07554ce7c0aadc9b9b47ec2fe495a4d1151d08bd1a4b0b62327feefd764222c48db7f2241f873e85dae11ee15baa6822eca870"}, &(0x7f0000000580)=0xc1) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x8}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000002c0)={r2, 0x78, &(0x7f0000000340)=[@in={0x2, 0x4e21, @multicast2=0xe0000002}, @in6={0xa, 0x4e22, 0x2, @remote={0xfe, 0x80, [], 0xbb}, 0xcf}, @in={0x2, 0x4e23, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}, @in6={0xa, 0x4e23, 0x7, @loopback={0x0, 0x1}, 0x5}, @in={0x2, 0x4e21, @loopback=0x7f000001}]}, &(0x7f00000003c0)=0x10) 00:47:04 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2737.377132] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:04 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300b5a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:04 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2]}) 00:47:04 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:04 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 00:47:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) r2 = semget(0x3, 0x7, 0x200) semctl$GETVAL(r2, 0x3, 0xc, &(0x7f0000000280)=""/158) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:04 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766dff", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2737.482258] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2737.490774] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:04 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03005ca31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:04 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766d01", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:04 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x86ddffff00000000]}) [ 2737.577116] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:04 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766d03", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:04 executing program 0: symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x4e1, 0x0, &(0x7f0000000180), 0x201820, &(0x7f00000001c0)={[{@gid={'gid', 0x3d, [0x39, 0x3f, 0x3f, 0x2d, 0x7f, 0x35, 0x36, 0x7f, 0x32]}, 0x2c}, {@uid={'uid', 0x3d, [0x33, 0x35, 0x31]}, 0x2c}, {@creator={'creator', 0x3d, "9f5a2c5b"}, 0x2c}, {@uid={'uid', 0x3d, [0x3f, 0x36]}, 0x2c}, {@gid={'gid', 0x3d, [0x3f]}, 0x2c}, {@gid={'gid', 0x3d, [0x3e]}, 0x2c}, {@file_umask={'file_umask', 0x3d, [0x31, 0x36, 0x31]}, 0x2c}, {@file_umask={'file_umask', 0x3d, [0x30, 0x35, 0x35, 0x37, 0x32]}, 0x2c}, {@part={'part', 0x3d, [0x3f, 0x3f, 0x3f, 0x0, 0x0, 0x33, 0x78, 0x3d, 0x35, 0x38]}, 0x2c}]}) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x342, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:04 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r0, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2737.635109] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2737.643644] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:04 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:04 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03a201a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:04 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766d1e", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:04 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x89ffffff]}) 00:47:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'eql\x00', 0x4}) 00:47:04 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x7, &(0x7f0000001640)=[{&(0x7f0000001740)="807342ff5fcdbb56d59555d70794dd2e464d0419823f0c9575b464d413386e37df3bf8f510e1456d8e20e56d70a559fd0b00bf6ab1cadcf32c2e9de9f8aaff0b7f071ab71222fc8e0ae01d42fc20a3576df901e664ed5990f58712789a6c2d12adafb84219c3bdd7cddffea1185e0a8b9f850143cb4b825c660231a5530a7e3915d2ec9db2bc91c2d800ea396ed4493bc05c9589f7832b66170ae8d3735bcc11cd5bb50e574f991b5f458d7396a413b2dbd556a47979a4e3e0e14d9a4401693d9e2c586be8c354a12eaed23d50b22e5fab46b4eac146ea9b7494ee329318616fb118500d326e67", 0xe7, 0x4}, {&(0x7f0000000280)="7f24977a51ebe15451958e913fdc92bb72013b82a7beba852cc86624181b8e7296047bf3b85046b707ce7d960d47b6e48fd3896d5e036753b2bb086cdc521f1c31ca6ac92eb5b18a80cfdd467f3a7de104a49a036184465af6dc", 0x5a, 0x6}, {&(0x7f0000000440)="3298051e78ec12b2264d25e84d0f327b04e71be17c06c8e14e624d97eaf18918a74ca72e8fc30cc18e19d79d5673411f3a9bea55a9910d053542b79538e19cb507e785b48d8c248a39f395e2a89e", 0x4e, 0x5}, {&(0x7f00000004c0)="edb769c0ca0719b340025f054a2a5aed520e2f2d238729b1c6c999d4c4201c489fe1cd2068eae4541ba68060e9dbb92db4d391f919ba9d4d8e3c3cd017eeebb7f29ea960e5d403fa071a2ed7dbef8e1983f346ac6a51164dafee33bee46d04acab2782912f8a0fa5f10b8ea7a77005ea726205abea99d8bb9b43270fe2f412d2d6e73f4cf21ca66374557956a964503e33a542ea1e", 0x95, 0x3f}, {&(0x7f0000000580)="a0ba242c9408d1d6ee492c2147895f9548c57edcc8cfb317b2d1f892f50dcfff19197961784ce06e7d23ba3d2517c659322d68e5968908ede4d702fbbf04c186de2ce32684d4ed06fba8f883c4e4e77938a6eb151343d8e1296ee63322d947b512678cce449e4787", 0x68, 0x80}, {&(0x7f0000000600)="7792e296d41c57195afda0c5b89ccc335cd70aa69527f3ebfb5509af67e1f8df4fbfa24ae2ac18a2c451e7", 0x2b, 0x3}, {&(0x7f0000000640)="f18c1952854d8bdb929e38c8aa101952af474c7c952d8b4bec0de2db8e89a3edbce9ce924a954686b15cda2284d7d19649d9024fa0fc35126bf1f28c4f8f10e50e3242dd4bc9ff8cc8868ed994da3e429f5987c1a985378d913a51a7e991b71816698e40d8b1517faa882f4587934e001a0c100ee85a66647f8909b303fb61d1cb6c3c974efb7c7dd7ea132167a4d47a0cd1caa72f53afeb133102f309a699e29f8c6b4de93cc3f551b4541adb368cf1a85a98d80f54bce342283300a6e98b133b086f5c6e39b4aad662bd05710cdfbb31e079e1f7c594acb04a8531669f2246580fe95fb56bb966f2e8924fd14418da8b67ceb257b50cc398ac7df0861c93c9a5693457e8e25b5a5a8ac82377007364d77e183eddbe4020be3a3c5251ca3503e79dfeb63c5f35a5ff2c0f41e1d9b4fedb0ff8febf6e1d7037782574f749f8eedfe8bacf7009e61a67869773ed396bc913c305d3d664839dd956c3caa9acc829f992f730228e5a3a879855807ec4814631995cd5ed420268cd597762036c0152acc63392a017e576097194985baa6b66bb3dcf424239955439732e3b304998e74ce3b80af42170554f88867b4ab20bea20d332ad370898fd869be1684344d64615d5eea1a9e54306106470bc603b31519118d03e1085ec86a36958cbd57025f9359258c6c16642b867ee6f9df8bfd150af3ea57267a24f9168eda79711572345bdb2eba29f5eb1b4bb1b7061d800543ab5bb7c7730c90bca408daca26a2c12daf0a6c3b78565873e96be25d78e7c41c8e57e711b0d56ba3345c5e5ab0e14368c0981a51ff1aa697379e6e0076cd698b89029cb67e813cd3701ed4891fecc5c5c552c168a216240153b121f6edbc3fe7870460f8d5eadda46486974e40922b23e30002ba76a34c9b4c5a87cfc3ad5024a2bae16d48ed52a5067fcfde3286c907a98fe1b1a0b41c55ddbc74cc3166e8b3841d3a5628f2baf0190a12f6f0d02cb2153af130a5f89884386b6e169fc9144f15226e4d7fb1049c38f1a1773b7c10dfdbecdaf1f3a8c03c470b78abf70a9ea32ca003a8819705156e969e1784391a271dd1a8b8faf2b98a145bd0883cd9d49cc9f568bfbf75c41f4ddef1c164a641390422418eab0e574e12cfe931eae4ae844bb6a87bb7c1a1237881cf08b76b0c399d7cede2686c6bdac1cd814b6f026efc1f3d733fcd5fe6d021ff6d7672400a03e21c581b349436d27c1ca10bf91723034db6e6af3496282ff507864703810c6e6156ffc4ced9452d97257ab55bebd208d4e28feeb1588a4012cea1c734532c4e132e67d86dd75ef92d7ff70ea1d9335a33d9ed2f27f8fde9fb49e92f66fdf9785cb3904c8f0ea66379ae621ad348e48fdbbaf84014d61f2559dfd19e5d5fde4f0b785b884efe186533524b3731e2328c83a8e0ff258d0e13c379ff2ba0909913716830a2faa8ac6a1df6fe52c2b4f7cc3440fc8c39748291f3c27254bc7a4e35ea18ef735e03b6252584dab7c527cb6a4a9136328709d6b184a85ca688ed4431dd614304921bfd27925f7b9e84a470172d87d4145c9d658269ac36f250e136cad74df7ad35a87b3291d9058b067783a55f99d3cb27d550daeb56e6c7beba44d21db9f25f058d1a019bd754ff2ed7ad9ab64878a0aa2a7c7989e5803b96af449290ff347f0957ffb1de70df28949ddea540bfd4d6699abadf17f1f906eb679f08bcf5329f454c0a51ab1d40c6db96d5708ccdac66375ca30aea00ecb2bd0e6cd78fde657ef351616b7fd19f954bad8470f9ecd5a47591a31ee503208dbdfae9dc1c755a91b341e2dbc04846209299542d20abce59a5b598b57420edef22ef670cf72581a274d208bafd61d9021dd0c9535848665f34529fff26d70c0633e6079747159339eb57361dccfd5443a1279070d1d119c4aba7316bbe30770fd7aedb9df8d630cf17162779de3a2473cc257df0b03ffda722f9c7b901839a7a3147a097d7a1288ed97f1363aad488c1bc5d3e8088b635aa20a6a082935ae00c5a3b113b07a42ae11d16054e370b30ef4e059b63d0142ef1def03811b14bf741689e91c0b1a8cb197aa07d36fbb90de22e1e7aeccfa3a477256d7c0f5921645457e7f546d77c826b3f7c8a4a3064c6489e8f1741ba0fcd16c77d91743a21a8c3f867eba79f61c5437bc49ac08edc01d256e1551db5f994828aa13bee25b967ad1e8c11b0d0b0f84d684c190263d64bc128177f32b7ff75967893f7528adef02661ec2fc4dbb3d0a55d4cc7d341620e3de866628b402814b8c6e97af987cc28f4e44a3b01e91284046d48114f62ac8339c4cf6b0feee5626a4399a81b4c409ee0fe0a6b6819afb34baad91efd3ddc3b6fa1fcb1eb390dd3bf88a030981bf77b11bef09f1bf1cbcac7b62dce42e20ef964b0da524eb2dbc8878e82986eea7dfd91d074d072a1c7b164aa4a22d9eac6c70db8fc33f16a9563e2eecb8b588dd280bcac62e08896b202ba044f7f07e6be10932bf572bb8f502d3c95bbf6143fb0a06ce7d321b830ee8ed67eb73f7ff5094a3d61c71d3c5774383ede2693b2b277e2fd49e5fa0212f888d9ce94f2d6fb66803343f40c9e7e7d172faa0b5703134098f8df94eeff112d6e68e7e9ff77342a743bd3e66d19b1b1585646f05bacd671efbc28c2427f00aab9c80aa9c53b31ddecbb9e38675bbdb76c29ca060d8570409bb6293bdc62356097e73c4c54a57d2552bcc1b76db3b0700ef7ae4ad845c449d27f45a993f900cc37bf06bece0d95604b2c395f7170ed0b90767ef7997c73691ed1138c684b24f3aaefada5fc76990ef1c9c74e7580b2af6ed45e6203245d8531085569840b9283144d61f23f262d06a43d19eaf3694ecc6c2350b4c20262c6ba7ade4d308a6fba314a429afa3d2f60afee728346f1cc5fe06dc6b6d8f0cbfc4aa2cc0397dee5228db2df4b5d9f7bc06a010bb4c2b9b5c76fbe473a944c086fbad81b493ad41b00e856ac34558767e9892787e6d6990eee4435e6895e39a8dcee6ca3cf8dfc7b76f4c41ae1b0ea88d84436ad7de00868952d44793687eaf4a98b0b37afe9381cb604c475d318616bbc11c3dd987e9461bb07008b339edf747d4bb4a8e18c396781155c34661e19a7c277cae5a834d4211584fea871a855c9be653f6674615a83711ffdbe8036fc2906a2e3908e9c4730876dee7955c138c737efefd422b68f3075eb19bd7d6f310098f4d3050744bd1976329cfd929a5b2d9818633db8f6e535199422512ef7b4116c3b7b45208bf3563841bfcceaf9e4bb1cf2806342f5e8c98dc48aa7e980c3b792fa039f0ff4f26449156c8e5aa3db620c8d0673ec3d697bb87163fdb6327b0a28f2e6dd8df4ca24483d7e12924885481846710ab99f07879db4b2fd26095332e31a5033b10be570b3b5c2fabe9473626bc58e2ca78002f0f17eebd96c1d834174dcceff344e57b533d5aedfcce63bb1f4a4e158bc978fb1c013eeea8aaad309f8b92fab05fb3deabfd76c5c9012e49b878ea08d2827358eeaed8fa86dbcea23a66a0367cdd01f01ef9ada03bc15a74cc4cccc1f7ce0d1b7c87e9a3acdfb3e5e19e4b1a731e666ff3f6d895495b3238ae3183a8c990055894135495bbb902fcb78b451b2af29e3f0c5800319ea9b7b1d203d4f07bd6ba0e70117ff65c95192f3ace6c9ced8d3a888386212fcab1dee48e89b5f6d231b97758896876ecd80c0e21639a6e177458c25e7dbc218cfb8a531c493c1240e186484658270191cdf67e5f806c8f441ab6b6767fb8b79c616c54f8d95d653cb9fe117fe76851e484e0043cc7cc142ff6145ca50bfb6167db815f30c4cf8082a1869589d8a81e325444e154b1c3cd82f55a66e06060a7848b453afe8555cff390276b4ef83f24e0d8a9bbcdfce2c2e7d308fdaac3f56b63048b183aea191b35105ecc506b400bd1c2d71636e889a649e01428cbec8f9ddd9ad7fbba9de9d93237b4df8149ba1ff72bf5af5f2adfdd2b17d217b0e4fddcb040169de30a82ad61409ad5510b33e9350d6c481b013cdcda404ac3844fb9145270218dae39cbaec7558042e73422f905bec1e873dcb9056b1e0250db8a5941a0918be690a79775fd86c7a95ca0a2ce11083ca016d3fe8f1aff17e9cd6255f5b02f18a84e8786a0bfa3a74e92be29364fa89ce58498134e658ce043a3d6af4dfb223b01cc0c2f0bd8058dcfe4bc4bd7c58e8b23ee5e32a760cf44ca1961bad243bba9c666bbc26e66736dd3422b8f330819be736ba48891dfb2e733a6ab27eb0d280ed07826dfad3be702181498818c2d3c39a26607da0d601b8cb10aab593cd9347df76084fe1570c1dc312a0adb37488aca76864d979939e51560ddf70e84202574ae274a33b1609f6fc1c588df83b87fe350048341ff8a6331b9cfffac6faa90813894e8c334abe75bc64a6ef2a5f40555032bf9533ecc2ec57338c0ca6b5438f66f19f7848295707697632f1714fba38e4272d6c3c2679cc5d3015cd24178c9b90fa3ebc47966d50d87fb4c58b18bca5e5277ba23732efa2c2ad5b4eef4e82e8d2b6f398fe67f1e0338cd0b4d9b2508315d64667b467f30c8eb4da1ded7d24fe2a76d2b707289e7178a2340624b9f3a390846d24a06881d2ae352fae32c94746eb64dc90ac44adec3661b0efc0c70ee2c4b98453b0ea34f44a72410fae867af9b696735885daee6b1168ab3c98c911e16d1a92352800aca28bc918bb15fc28dc5c9fcdb1c8b29605163591c1bef5ccae142ab0a0c1a84699c1985bbf4428843971e3b1e9f770fe83081250f0b7d3282a6b8211e8f0c14bf1026b3da0bcf40cc0110a115d28575810d47bcf2dfc1964ae7569af8d5b09a6888267b600bc7551141714df4832502027117df3545074ee511d510e0c89ebab09892d6f461aa21ad570c8b4269ebc9af3c135ef7adf3b3aa160108283ffb04816edfba264ced2db0eec105fcdb79cc47d9248cf070efdf0ff0f97b6bba8b71a0d1e4ed7836137bb7e3888fcc730aaa306cbca27c3133d5315af34f61176f512a21663dca5cf82fabeff858c7501314311e28646fe7c077f3d289c799dde92cf2b1ca7744850d473ae57c8d6b92b9f4779e6be820beba788101306d846dfc3d1194f70e810829176b9b59698ab847018781b1b20647227ec2e5fe25152bff929b9a3b2d7e4ce4b2af79073d1f3300cef1f13a308e11545a0a43875e39ae0b6b8be2ea3fcb7600e70af90fa0cdaa354f092a4daf5ae4c346386245f58ef30d8933bb40178ba4f097d01ea6bed41473851576e300c89a55b077b18306df8135198f2274d32962022ca91a30f98dabd46c7b19d20ed23a4891bbf36098c9be4315921bdb815e31e9b9991e93e43fe520607f27cc314529c1ded9095a43b340a204d65a417091711a61625cca2cdf47978e5563ee728a6682006009545fd30ecf43dc1c6bc94247ba0f599a40b5370b66d1447dd40bda8f244781422b4fd8721bd61e5bf166cb4d522fe7384efa7749b8da0178b0060b8d781844b6339fa4995b96462fa5c2adefaed1192b4c33ae73dae543b124eef70bde03c981222b8fa03dcbf6ae82c6e2eed4e11fd43f637ac4d86cbdef3b075bbad3cac94da41aade72f9eec23af08a49d6d06de569e64940503f6bab5e1502209d6723d883fc44ee02933963c2abe0c98da22b1885298d865f7b726d7df67b3ebf94c1300b428ce3d453df4a295331a99905ad22d40551beec14586aafb10c76580cecb6f2f73addd9fd0f912fec192f04b6f36e6959cac9e0a5140e9b9", 0x1000, 0x8}], 0x1000, &(0x7f0000001700)={[{@data_journal='data=journal', 0x2c}, {@grpjquota='grpjquota', 0x2c}]}) unlink(&(0x7f0000000000)='./file0\x00') [ 2737.751792] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:04 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:05 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:05 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece031c01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:05 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530ff", 0x0) 00:47:05 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000013c0)=@sack_info={0x0, 0x7fff, 0x3}, &(0x7f0000001400)=0xc) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001440)={r1, 0xdf, "ebfa137d129abe7208ef8106e849f276d05579d3089283c11a22a512785bc40b62fbae5409754abefa1a867606cf2b711eefc59e51520274fa141c972ea7c9ca1ddafc426e751f1574131df388b27b6dc6fb5662c54318313d9af31c99c10a2dd8a3fc01d5b9f71ad7b5477d6090ac535fbf628fdf2f416ec934f06d161b58ef66751f53027c16e795be7e2bb19822912ffe7dc5e85cbfbea1ace54f02c45876ac2815a00445625169ccc5a827ad750746713a8e4eb17be2321beed70f9a40408ddb08e31be9d78ae17bbb06b26f6929f5c2c5ecd4f5d054fb96339c64acb6"}, &(0x7f0000001540)=0xe7) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r2 = socket(0x61b8bda25debe2a9, 0x3, 0x1f) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000080)=0x44) sendto$unix(r2, &(0x7f0000000340)="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", 0x1000, 0x2400c000, &(0x7f0000001340)=@abs={0x0, 0x0, 0x4e20}, 0x6e) unlink(&(0x7f0000000000)='./file0\x00') 00:47:05 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x3c00]}) 00:47:05 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000100)=""/47) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x1fd) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:05 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2737.930744] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:05 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:05 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03005ea31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:05 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x6]}) 00:47:05 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2a, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:05 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ecb(twofish),cmac(tea))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) truncate(&(0x7f0000000000)='./file0\x00', 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="7a2e72a38c84c0786ec1360ccedd4618c656f5cc87b7025d397a55bba3d5462d20a457afcb3ece5989bcaf12e4efa4cd4c4eac561aac520456dc45dd0205c4a82c508296ea13fcd1416bea111ba49410c9df84d4b970d65ff1c9956cdd10a14ff0313712a0d7876227e6422c9b4a5943e3", 0x71) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='\x00', 0xffffffffffffff9c}, 0x10) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000300)=@ax25, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000380)=""/27, 0x1b}, {&(0x7f00000003c0)=""/36, 0x24}, {&(0x7f00000004c0)=""/241, 0xf1}, {&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/127, 0x7f}, {&(0x7f00000006c0)=""/150, 0x96}], 0x7, &(0x7f0000001840)=""/157, 0x9d, 0x400}, 0x142) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000002c0)={0x1, 0x3, 0x1d}) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0&', 0x0) 00:47:05 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:05 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766d04", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2738.080894] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2738.096212] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2738.104798] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:05 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xffffdd86]}) 00:47:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:05 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:05 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:05 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300ada31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:05 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x1c00000000000000]}) 00:47:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0H', 0x0) 00:47:05 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766dfe", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2738.247757] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000500)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) socketpair(0x1f, 0x3, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pwrite64(r0, &(0x7f0000000540)="406f59004322372617da0fa4caa4541e6c62ebaad2828b37afedd0d2d91297362e5a4c6e582bd9f84d35a3afe171728c219e4e9c95a491168c8ba217703be803dec89a2c8a70a5e83418c8ec0cbafe5dc4fe48fbcb04130524da722096b256b4cdf3c4654d4f7f421007de56d3ddbee1be72d64bdab2abe94f61ccfb05a715e4fea2bc7618f8fe3caaa5a37bd607a1f069eb4924b2", 0x95, 0x0) recvmsg$kcm(r3, &(0x7f0000000400)={&(0x7f0000000100)=@can, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000280)=""/23, 0x17}, {&(0x7f00000002c0)=""/46, 0x2e}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000300)=""/73, 0x49}], 0x5, 0x0, 0x0, 0x4}, 0x1) 00:47:05 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:05 executing program 0: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/62) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x2000, 0x0) write$cgroup_subtree(r0, &(0x7f00000001c0)={[{0x0, 'memory', 0x20}, {0x2d, 'rdma', 0x20}, {0x2b, 'io', 0x20}, {0x2d, 'memory', 0x20}, {0x2b, 'io', 0x20}, {0x2b, 'io', 0x20}, {0x2b, 'pids', 0x20}, {0x2d, 'io', 0x20}, {0x2f, 'cpu', 0x20}]}, 0x31) [ 2738.305171] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2738.313693] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:05 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766d8c", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:05 executing program 4: prctl$intptr(0x24, 0x100000000) r0 = socket$alg(0x26, 0x5, 0x0) timer_create(0x7, &(0x7f0000000000)={0x0, 0x21, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_getoverrun(r1) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:05 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030059a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:05 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2c]}) 00:47:05 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000080)={0x10, 0x1, 0x3}) 00:47:05 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2738.444086] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:05 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766dff", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:05 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="b08315ef439e58fa9ca5e46eedb0cbfb48d0b1338b3972de6539e1bdc3c2403fdf24a69d324e19d138b7aeb3ff098b40c9af0f63a05f15dde4a9af2b916c12487e625fa176ee9e707447197f2e5a3fe6c8019e719633f58e8b50fc7e67db866dac7ed483af46a24f0735909eb78a4eac02910c194351ae6b5b644fdb5a7cf1bb8cf33a65f3ad63ad74b3945c75cb9d020091b415855e7e8bc1a386b9a513f0b9d58e3f42974bfcdef7057313e485436673e85a6f5935c06ee3844407e73e78f0e7554a357dec0d29866716a0bb0e98fe8b", @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYPTR, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES64=r0, @ANYRES32=r1], @ANYRES64=r0], @ANYPTR=&(0x7f00000007c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="a7e1efc878d180472a76beee07123e9b22d6db607f43fd5a3380abad4a2e63cc2a41536908da897fcfa7319b51807b5880af3824e9bf697530ac485b79585428f8a2b459e2e62c97c4cab57b883e29a240a3cad1b7cd50e6eca517f7faf1a0e76184179d34162749821a2e676cb950de643547ab5ff4542ed767d0219d59b6e713ab4a8cd81d5757d346cd84e58eb131beaf505988", @ANYRES32=r1, @ANYBLOB="583c3d6d80165c047fc59ba325ef0c3e9cf311c3f5a7308afd7e42a31e8efdeb2f3c625f4c708d2b99b618c9d18a6add680c2cf3dedfb4c9eab666700ffa4fae3d4f59b04e06d06a132eb2a720d305e39f8533d250fb0247673bfadbf9565bace29c15a0cabc14512c26fe93", @ANYRES16=r0, @ANYRES32=r0], @ANYPTR=&(0x7f0000000040)=ANY=[@ANYPTR], @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="410e5a271a14d07d519a71825353bddfb5aacca3a6a99d05de573f7a275b9a2066a99de01229bab7298872531bc9ba2ae483047517079b116de1fb817e2569840d0564aefa52c4b9b91456254a83928985e4aabc9c2f31364a296d8906", @ANYPTR, @ANYRES64=r1, @ANYRES16=r0, @ANYBLOB="ad0d26668e158321a6e5f6b0c3bbae2d3832343c7cf5f91652a0fab0210ef2cf7753e3649db1139ab37c233681b4ce9ab3bb2a2e75eb8ba578797e70747cb339432091aa531e9ca3ba8b0f62dd7da76eeb64832535d94538e4fde87fd11a19bc97fbf7252580ae2cc910fd3608abe45bcd0440e7636b51df7d7d384563df878bcdaee23568b0906d517f9ae5d1a353c91c0e54de4318fe6fd902e2a9830e77f1dcecbc3a4f17537115e93c44fa0a8384e4e49dac6a9f1fd3fb0b613fd0c3f6e1553ace7b4c8d2f8ea275521bac8bcdec297c376651f658df5d991cf8f7"], @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES32=r0, @ANYPTR, @ANYRES16=r1, @ANYRES16=r1, @ANYRES32=r1], @ANYRES64, @ANYBLOB="e6dd839a3e24b2ed58ade0574d6ba7887a3ff69003a347223ed2afe98fdb75cede99651d9d9559cff7fff2f87e383ff4e09d7af2c6bf1f5e3f887b94ac043b9adda74d1fe8e4c2fd3d445cdd5845f656deb4b720dba88d71f7f97b74bbf559a19fbaac6a55c4c54338c9f3babfd3e916bc97d02ba2cd", @ANYRES16=r0, @ANYRES32=r0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=r1]]], 0xe1) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/uinput\x00', 0x82002, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r3, 0x400, 0x70bd27, 0x25dfdbfd, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) get_thread_area(&(0x7f0000000000)={0x82, 0x20001000, 0x2000, 0x3, 0x7, 0x9, 0x1, 0x12, 0x9}) accept$alg(r0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f00000019c0)={r2, r0, 0x1, 0x9, &(0x7f00000009c0)="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", 0x9, 0x1, 0x9d, 0x33a, 0x4, 0x2, 0xfff, "47e77d05935c19361f97b94518777951ade6a22e7d785e6101551e65a59ebf2f9521bb77f0188b371f1296ae973babcb949bda97d70b3700e98592bcb95dab621ec451bac0f237769eb588f6a9530f114882f022ba7932ebc173c390cdece0a95c3343589c81c57d9e5a8e49de208c1785df23a91837c426dcb700c406fa380fbde0119b62514997bd3eff2a1a1d0859dc5e9d258d8e2f60693d464314b689b55ba66f7c708af63894af8e30af7621404f2da6a3bf11a9fbdf2f8abe403588b27bb6b9af24"}) socket$nl_netfilter(0x10, 0x3, 0xc) 00:47:05 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300d4a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:05 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x7]}) 00:47:05 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:05 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:05 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2738.614166] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:05 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece031f01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:05 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) symlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='./file0\x00') r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x400000, 0x0) getsockname$unix(r2, &(0x7f0000000280), &(0x7f0000000180)=0x6e) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') syz_fuse_mount(&(0x7f0000000240)='./file0\x00', 0x6002, r0, r1, 0x10000, 0x20000) 00:47:05 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x3a]}) 00:47:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x0) fcntl$dupfd(r1, 0x0, r1) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:05 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766dff", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:05 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known="73656375726974792e65766dff", &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:05 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03013ea31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:05 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2900000000000000]}) 00:47:05 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000340)={0x16004, 0x10000}) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r3 = msgget$private(0x0, 0x200) msgctl$IPC_INFO(r3, 0x3, &(0x7f0000000380)=""/96) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0xe000, r0, r1, 0x91, 0x2200001) unlink(&(0x7f0000000000)='./file0\x00') r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x1, 0x0) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) 00:47:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) mq_timedsend(r2, &(0x7f00000007c0)="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", 0x1000, 0xa, &(0x7f0000000040)={0x77359400}) [ 2738.798914] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530fd", 0x0) 00:47:06 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03004ea31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:06 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:06 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='uecurity\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:06 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xd000000]}) 00:47:06 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x2000) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'btrfs.', '\x00'}, &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2a, 0x0) link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000240)=0x43c, &(0x7f00000002c0)=0x2) unlink(&(0x7f0000000000)='./file0\x00') 00:47:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) getpid() write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) fremovexattr(r0, &(0x7f0000000000)=@random={'os2.', 'aead\x00'}) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2738.949974] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:06 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766d8b", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:06 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030009a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:06 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='tecurity\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:06 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x6488]}) 00:47:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000005", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:06 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000180)={0x0, 0x7002, 0x81, 0xc288, 0x3ff}) 00:47:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10, 0x109000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000040)={0x0, 0xc67, 0x6, [0x80000001, 0x1ff, 0x5, 0x40, 0x40, 0x9]}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r2, 0xff}, 0x8) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r3, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:06 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='sycurity\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:06 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:06 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301b9a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:06 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x100000000000000]}) 00:47:06 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) r2 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x0, 0x200000) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000500)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000003c0)={0x0, 0x3, 0x1, 0xffffffffffffffc0, 0x8, 0x10000}, &(0x7f0000000400)=0xfffffffffffffea1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r2, r0, 0x4, 0x1}, 0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000440)=@sack_info={r3, 0x8000, 0x77c6}, &(0x7f0000000480)=0xc) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000280)=0x8, 0x4) r4 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r4, 0xc058534f, &(0x7f0000000340)={{0x0, 0x6}, 0x1, 0x6, 0x7, {0x5, 0x81}, 0x8, 0x7ff}) 00:47:06 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='secsrity\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2739.156526] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:06 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:06 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301cda31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x1deca0000000, 0x4) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:06 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:06 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='securisy\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:06 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) vmsplice(r1, &(0x7f0000000380)=[{&(0x7f0000000340), 0x1000000}], 0x1, 0x0) read(r0, &(0x7f0000000000)=""/126, 0xfdef) r3 = dup2(r0, r2) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x64) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB='osx.vboxnet1trustedtpustedppp1cpuset!,^-em0self\x00'], &(0x7f0000000340)="2c2d2f7d7d76626f786e657430c43a5b00", 0x11, 0x1) unlink(&(0x7f0000000000)='./file0\x00') ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f00000003c0)) 00:47:06 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030155a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:06 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2f000000]}) 00:47:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x7f}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000140)={r3, 0x0, 0x2}, &(0x7f0000000280)=0x8) [ 2739.343340] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000600", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:06 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:06 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='securite\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:06 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x800e000000000000]}) [ 2739.429585] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:06 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03b701a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x100) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="a7b82c2ac805f053c9b386ee0f782d564b61202bba3b3b80643d3e818caebd477dd0e6da033564635faa4cf88741b3fe17229b0b2a72c6153803e361a32ffe358ffd0333656a162d9a1ea191940a7e2f491b80ec75c414aa10056df005", 0x5d) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2739.485479] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:06 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\losser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:06 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:06 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030a00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000400", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:06 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2c00000000000000]}) [ 2739.653874] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2739.666701] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001500)=ANY=[], 0x4cba) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x101000, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x0) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x100000d, 0xb8, 0x2012) recvmmsg(0xffffffffffffffff, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:07 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louter^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:07 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766d01", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000200", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:07 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece033500a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:07 executing program 0: symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000080)='./file0\x00') r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20040, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0x1000, "ef17f0e2bd188d16be3dc680db24388cfb65e069c470205f4f773a6e32a4f1a9351d8d99415c7546cce6c64f73bcba0af74ac114e29654c57e5ca8d1fc0ffd7584a939e81a7ab24ea78f3d0d3abe0227e6fdb60ccf69b0a5cd393a8ddfc63413bbae1215b6d4165d10cfbf4d5e1c224582fea84af069167781e1f4093bad2ab73c90d53120911cf6a9ef17c3072001a2a018cb8af2e2b42323452b4da2013b5ec92843d752f322013f71c28d890148f3872b79d974b17c9399044e4f9cb21c095d0a663731983c6b6ce38858d9c7d2c0686f60dfc8afd5d160541ce1de2bb71b7a62bf73bb22d85f498213bd6eb694d472ced2b0f723ffd276bd96fddfe4fad65cc0c48f11d9c8c512c4256de1c4d7f3e207783603b8728938b85b124933a1b6d1eaa78109b6954c7d38a7cc376b5f818c4f745c71930a999b59d59d254cf4fb4f87de5c3383bb5ce19a7d5de9d2d08bab28e6b380c1ae3af354d5a9b455c0f6baaa67359d757caf8d4ba5fba37d587d208028aea331b925f24bd3899c2db3979470bd9dcc45f303865686c1bcbe743e29525187135d80ffab3c99f173978481f300b9b5e590afab643849d27609d1e49476b4b090344344984518448b56dffb786f1c48d6dcb392f3d0da976191472465fdc0bc27f8492692bd74b3bdd1446e316dc48d98b1c02220166630e861f06437503eacc78a99f73f4f63d229b3fbd300e073fa1294e6764c078a094601bdbf0db6c376407d9d733da60c26ab6d961bc8e82ba205e68d7d84f08d025458a863f6ceef84cc6053073faf0d865436bf8000ad234be0f2e3683bc16c85e9b4c018c0c8bf86973ad564d385d202a07ca0c0a39c0ba3cc0dd86c77b9d4b0cdede1bc5c9a132ca5bdd5cb26c8b9d7a095268d9bad1a6a0b1977850cb99b46455738abe25585a033200a71602e2882d0ba34f9e7633a6b01c5ac278fe84ad3b076bf6a7faa0c891f96367ce49fc62999aa1d8d92a78b6b85a792531458927760ad9b62fa21ba0cb1ed533574e7d915458c4884b43b2fe04d43eff315a9807bd4bf74e586fcf8b76f4dd5e3674b63093223bfba8d7b2790a0e98bd86801ddecd471a683fe7abae7ab8e27807b9a5727bc620a1ac973edf40e7de80956c5ffe5ee7e2eff8b28c8f451dab7eed1a1d26b2d0b7423c6b542aba7a5c09c89536d7c3ce90b314ed35e1b6fdfc45a25d2be4b6ae38b1cd88458d1606000e728f9f3b4c6776f83c81cd30e5c3f961025d3cb1de46fa4b3a7041c1ce33b095304ce94f142ff16b3dd10098bfd15b213dee156c0933a528732c1b2b924ef7deb0cde8c1255a145df21ce17ba2db0009f7b6492ff28706c7a15e6dfaafe9b45c4c8899b6aa6f2283d0dbb552e9d3ecc859fe7e12ea4144530d3b8be8651a4f1da8cfaa896d3b9ca72d605c2423ecd439a2fae9bf413584168e540b2de471ef83a1cb11eda1304075430422bb8c4e32e241d81456843b36d1ff21ac291c35e211a515531b9b803877017893015ed58a47ac7ca79bdb732ed5f6c50b560a512fdd70438d1bacc1e70ac7304620935409cffecec26973038bc0b12c2cd70af55551162b0db054d27a298d29cfb984efdd33e8e351f9f215c93376cf4bed8f5e9bc1b01b2d520768dd39a819688e87d364249021154e82801801760005be97de07eeed44b67407553521250f2474af4fa535071dee02d8ef662e87c2c71e3c8051d7758501560ec0a2dc81428128467d4676b8c81603bffcd7fc4ea2725604714c3d93e3a2d2786dcbf28865858f1a75c165208b57d785007b2b1d61071c408eaf5d3827a814b6ad2c3c012f1c9d1747e9bdcdae2dbb88530919afbbcadb05f5736427cb0f8a616df156741ac27747e179495022a6b764501883bac466a7d58dc4bb92448464e7c2c17745c650724ad7bf66523674204dd8cd9fd279a9402f3c0190500cad9fa09d6bcbb85cca979ffd7d5d1abb9d7986758416c0cc0910916370729038e1a0d1d505b1e6034e810b3add78ebcd31e032cebb09950c4412f8d3dd2cb9d708d91d23333cfebbe1bcbc8423ba4c09397d124006f2b97a8c3a8aaf4e27c496593a6a4fe792a04503bce235f15424a246efacf91bdd4cc3145f5c071286b3a2173a33b16805cd4f4b32376fa28a2bb95fbc061d864f2e939127ce02448223095c7d21a95e7d47fedcb9e74088970381479aabcd64cd8a6f29bc86db9426366754c81aaad6d9f5651eb4aee2cdcd6295edf9dba5c0fe81fff33791870f1208fabc13f300f735f416e89a84b9c767b68bf3c59a6bd94fcb50e434f43a6b6121642415508e5e00a3f525359e621e5368645331cae76f6aed6485d6dd820f22727dd738f9ceec958f53cd67e61bab2cef47d4bd2400bb0c86e15958e22b085dcc78e8dea229c97239db3ce766f2a3cbfb8c407bdc98f3f4591b92fcb211e539d549c98e4f8c69942c7924112a57e3270b16904b4033836e51ec22831b7df7a16f51f44e487a22c3f6a5519c32b02bb2b7d8e0a9ba4bc2de15d30de3104f4e8fcee23d57113b4ebb5e5318306763375ba0011c255c87c7e6401f1d094a4917fe2c04d7566b4ea9f6101b976039dd425cee5c7b14c4f2a7158c77cb2335fb1061a11568565797a84964177f1dbd62fc2fad50c241147e2c14970b3339192416ff8f5ea0ba62c6a7ea7ee7ee0b7cddf8390f5f1fac6859a80dcc6ed02b3b11c6362e77fec49fbc3dd375bfdbcdc846cb6f4519254b890242a759f60ba2f5aac74d6163bcbc8fe577f0c2e753a43091815a84309926b77fb9abebe32b6c23788303d8991be1094854ac5123b322ea2f7f0ff562c34003d3933a603599c5849aca736ffcc7722055f57961a06d3dcdf8f6e36ea132271d0383c7d04ac84a700fece589b0b1fdccfd88b18a079fba6733f98a99085f5f97283df835da8d92efb58b0bf1f94b8675442a683b43dbff4f3bad4ca062e4844f771be6c9246ae3775c5405ff0596aed62d087454c7a9f282d8854c2b00c17e73ede6d6dcf53f4d2ff1e51f38f9cdf3ea72eb741373b52a79a1cb1a70d6e95c87d794224998a474d710f43e9054273a574f239d62db238f1e08df38cc1c71ca6a60bacfc378e77d54c758c459f13d284c804846ce4290806cbd027dc96539472869354341b71c57ee9c02b2bea855f9b505706d911128c9ce31dbfb783bdae6c878b34210d70a80a4f941e17dcc9bcd0ef069228e2d9d7fe12fb7b9cb44b9eb72db528c5acaf94f58c646b36c477fe440d675cd930d222f4d23dbe871ca3c9e96b0f1d1dd1d0451cc5c7dced45286aedc00bc6a7159fbb7eac2ec961282448bba08a27c545dd6e77d46dd0c9e94b13cfe724b129c1ac09da3a30f0beedfaf50fa98fb1e5762aaba31c168442e5857e2b9b2993529f525a6b0675d9520452f2a7ba2593b83307d0f6391afe72f582d449b21ddb43de108ee52296de29b1b78ec2cfe64b0152dfe598a3e6a804e3462c96212aa1ee74296a4d040f6f6252c3241967894ef42017bb9b473bc91dc7a2f9c1dc043b43b3fb29925e6c50201de54ce435d134ccc714c53db9477fa7366f07aa3064c38f1fca4d2c76058970aa30824cf51a7c32889c0831aa87d291d780149d0facc1563be6f29e0ea10caf4057e27540a7261b0ce6955a7d027b4819dbb45e6fb5d4305803ffe713b6c633197a29a727f3b2c900b2f7042b5464c92e9f464d1af72042cb19b94d0742a4bbdd0cbce30724a1b5d546540ad908888cc90dd6c4e735a8525e71d11fe2b5bf15c7da7ff0ae7aacf1fb788155c4b634f8e6bcba46e961a948f5f3fcc3b00de405a13dc7ccbb70896e8a8c4703ab62f5ce821ba4f192572c987bf1081220f7a95811fb2d6a748f98714169fb6a6c5502fffe3201cc481ecb853072bf55b7f8e2d78b5c6a773a1e29d4cdfa499aa2a1565662918ac0d76fa7617fff05a6cbacd4406e5216adb5dd61fb1e969f99a2034b29837cb54a517987605b91a3d402d26368e46cf29a3164e1ddc70165dc5e39cdf7359ff233cd4681372d998278773cb9fe05c7483be9a3d7e2a1000e4e7c31cda3fdd54b18adba1c94a3d7b00a00a6f01914cd57730342bdccf1600e46b173796932db51ca4b64fdd288f83a2648978fa53092f641d305527922a38e97e6bfa2053d31c840fc7522c290b6f72d838e175d1c2f785ad01126ef26646bd03181d7ce50b40daff16c9a4b1a946781349b21e3c9772b4d80443ca2c227952428a5398ede8f26c89408e137c49cd401df45a70752f1d9bcf2dbd6fe8d0069f96fb56bd85a60a61c94166207e55ce06b3081cb070df1535aa72270fa416497a88c73b0b7879ae837d757cbd62489e4a3a912659eeca8961cd4a06ea778162cea0fcbf02b0ade2dcf9e6ca794d9f193c349af5aebdd818428040113484bf3d63bc0f6e4ef6d0c7178a0ad33f6acee2d855406a178d37f2241332aeca531ab095b91d338c799286a6620c599f9b3e4fe1ce8be23b9c015519271717f0ab81d52b728c3e0a880e4f165f7a836aa7d228ba14dadf2bb7f67d9f033ae3f237488bb2281e85746fc637d9351f153f108e0b27212d63cb5da0d9815d392226f916e9e418abd28eaf09f3c138229979a13944678d9e8ba01695d7fd54341f9ddaf45f199b7133e8ec40c37c31d9b24ccf189c41a0653ba0c15222d618d1e84ec942d608bce26504d23b1e2e6b1d3baecec4976b79f36ccc1b2b4055dc670c90d3f1ff350f8ab1264d0ee74de3b9f259e1a386ce3e3f2a37b87755568eec740758f228c36659f05bc7c67425b98ac6292485099a2e89437524283b9275601a8528c4b87d088a02f25f589ca73baba8a4836d4800c2ef53c1d348cc39cca01a261fa19c15c56b5b65959b3481ed8f3a8ada33b95c9f4e1c2e570c820da09ce8bd7ab8c7108d31b50ef91ca7f87aa5042e2fb2592bcc972016c1353d680d60ebe4552162664e68c3f6f912cd7e379d164aa68cc94e7d81a62587de6e11018d5a3ba3ea12c2d377cedf832329d7b4a66048a93a7727427cf705bbd3c6608d4438a4a305d59f69cde210bc123d11ece28699e80fbaf9427ef0919c54eff632bed757d13816d9f5cd9c4aa51d97d9a65a8a78da91421d295a0b36455aaaa67b9129eb39e8431db994ecafddc2d91ea7e50cf26d16f8ebdb730a613add0c1ea7e09a7a4f6dff92615984bbeed2abb917f22d7cddb70ee30e2ee3f1bcd8ba59e132861035e62be8fd81e2046fb625b620871967b528ddd0a0bb0a193dadddb4d20ec3bf3a07a7755c0d8d12ff2e241c0883cc437c5d811c50e7594246fb30bb2b197f5748e0480248f023a9b957ebaf7456f07712a50330e220946ff84e2be4954f8db1dc7ba83bdabb9c3e33d6e4bd9b94f8021dcc94379da2a376c5f0c22d129898978124fcaf45d7f166dbe3ad0b8f92835922ae2cf6cccd993fc185938a5b0f098fa0d1f3c39514fdaf9b80262828cc38789125afa478717da2e08d0aec1dc5f8657d29badd9e6d42f78718d6dc802dede903c629e382f545be020098f1f08033d635332fb5ce3077ecac590b773bd39f693ed6d97985ce25afe73f3888202483016edcec1e7dcf453100a4269e13e39c77c3bcb46a2817b9aa7bc51ca492949e7269edec343aa116c1dfb1d3974fa827f84443a1c5feaf72a13b3ac0a98c1308e51834da89a663d9a89ad3927c66d3cdf2c480e10ae19cb1f6e27591a84f9e8d0018bebad89c4d962a0b3cd00973cfda57f585d83789f6d9f33ac5d4954a844262b"}, &(0x7f0000000140)=0x1008) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r1, 0x7fffffff, 0x1}, 0xc) 00:47:07 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2000000]}) 00:47:07 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030d01a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2740.237183] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYPTR64, @ANYBLOB="57bbbc0f374e4d3ef7f11b5848c9e254fe613e7fe8304f5caeec3294ef65ed2b98bd5a749ea5bcd1927221e0d9f9a02654c8e0807c5959cdaf4765ad11d4d176e20f017423051dad7cabe4cf33c5cb4ec80fb6cb2ed88f2175577ac20e68d2b8614b53e31a038e9000af308d605c82ea837ae254ffec4e8a826d34a3886c6404493cb5c8dd7ccc1cccc0cb7a29a00edace4064e8a935f03e1525ff9e4c449e73f70bdca2df3350c3192e29c6103f1c56a84771deae2eaa151e95c6f36726dab026f7fb"]], @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES64=r1, @ANYPTR64, @ANYRES32=r0, @ANYRES64=r1], @ANYRES32=r0], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES16=0x0, @ANYRES16=r0, @ANYRES32=r0, @ANYRES16=r1, @ANYRES64=0x0, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRES64=r1, @ANYRES64=r0, @ANYPTR64, @ANYBLOB="5a3012cd18c1657898cdfaffa424d9309b60ff9d6357695f2f8f1da61f2c49fbc334eb93775aaf8284b9c3cc84e2892bf11d65ffd7182cf850e356e63134356e4aba1723d1817ac466e85eed3a737ecc19d570c7dfc27acf239e1ba10083"], @ANYRES32=r0, @ANYPTR64, @ANYRES32=r1], @ANYPTR, @ANYBLOB="bc75fbf451586605"], 0x30) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:07 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louuer^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:07 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2100000000000000]}) 00:47:07 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766d85", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:07 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x9d) listen(r0, 0x29) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x100) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000340)={{0x2, 0xe786, 0x800, 0x0, 0x5, 0x5}, 0x8, 0x8000, 0x10000, 0x20, 0x3, "224ced204419c4f3e26033b609155b0df472218cabd7f18ded2aaad6d92b0ea057889059a9bab4a923f3ddec65006da6dff04b7976d54e3b4999f96fb9962c9b7a7351241aeebd07b87da12776633d6132f736b6183e6e3e89ba99fe6ac2717d8b88a559681553d83befcf3f3e8f079de8cc3a121bd082bb22f68f64238f68f6"}) unlink(&(0x7f0000000400)='./file0\x00') bind(r1, &(0x7f0000000440)=@generic={0x10, "294e897c4292456417e0fa891eca9b96a0fa82a77b8c0116ce2998d8dc6069bf3f0ccd07e73991aa533362ba4a5fb2ce1798e5c72c73cbcad8515a8f6fb8615cfce16e1983777682b159fc69c93a6d55bfc4ed2785908f6b422053f2bd022514aa4e78753b97d84fdf6cafdd9c3c187226e6d9467b4780a5e8bcc9640fa3"}, 0x80) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000004c0)) r2 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c, 0x80000) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) 00:47:07 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\lousyr^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:07 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece032f01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:07 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766dff", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2740.371115] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value [ 2740.394551] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:07 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x4]}) 00:47:07 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030b00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:07 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdyv)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:07 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:07 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000002c0)={0x0, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000380)={'\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'syzkaller1\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000500)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x14) r7 = fcntl$dupfd(r0, 0x406, r0) ioctl$ASHMEM_GET_SIZE(r7, 0x7704, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000700)=0x14) getpeername(0xffffffffffffff9c, &(0x7f0000000740)=@xdp={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0x80) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000ac0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40002010}, 0xc, &(0x7f0000000a80)={&(0x7f0000000800)={0x248, r1, 0x800, 0x70bd26, 0x25dfdbfe, {0x3}, [{{0x8, 0x1, r2}, {0x1a4, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x1c53}}, {0x8, 0x7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x81}}, {0x8, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x10001}}}]}}, {{0x8, 0x1, r6}, {0x80, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r9}}, {0x8, 0x7}}}]}}]}, 0x248}, 0x1, 0x0, 0x0, 0x48040}, 0x80) unlink(&(0x7f0000000000)='./file0\x00') 00:47:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) sendto$inet6(r0, &(0x7f00000007c0)="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", 0x1000, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x8, @empty, 0x9}, 0x1c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="d179f20600000800fcd3304500000000000000009eb147671a5cf56ac2cb8e", 0xfffffffffffffef6) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:07 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x88a8ffff00000000]}) [ 2740.565277] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:07 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece035b00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:07 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:07 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)ym1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') fadvise64(r0, 0x0, 0xff, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000080)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2a, 0x0) unlink(&(0x7f0000000300)='./file0\x00') 00:47:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) wait4(r1, 0x0, 0x1000000, &(0x7f0000000200)) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) flock(r0, 0x4) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000100)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:07 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xfffff000]}) [ 2740.695952] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:07 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='./file0\x00') lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='\x00', 0x1, 0x1) unlink(&(0x7f0000000000)='./file0\x00') 00:47:07 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03de01a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2740.741677] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:07 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file04', 0x0) 00:47:07 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mimy_type\'-/proc\x00', 0x125, 0x0) 00:47:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) ioperm(0x1c32, 0x0, 0x4) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003240)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003340)=0xe8) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) r2 = accept(r0, 0x0, &(0x7f0000000000)) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) r5 = gettid() r6 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b80)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000400)=0xc) fstat(r0, &(0x7f0000003080)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000003100)='./file0\x00', &(0x7f0000003140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="600100001400000226bd7000fcdbdf250400630008006c00", @ANYRES32=r0, @ANYBLOB="09d0030a001a00", @ANYRES32=r0, @ANYBLOB="3375044169aa863183a48b586cd8bef0108693ab7e10d011f79e86087429ae71dff98378ae0311e9cb2b829a48d6ddd4ea09da5389976e8d6691e70d5ebe6b016d6838a89df36d50d6c8d15a6b93237c2ff131462847bbd3b219e7fc05a77fc1e173a275f5584a511e83d9cb818f025e52bfca5479533d72dfcdafc5e8ebc92f9d2fe4190b2814336c35d3bb1a87b5b0709412de1abdee6d89ca9f58d3d8fd223b4b2063342f2d8bb4a6151c5a0cec1e2acd5a1f42b23d4e21ce4162bf24ca42eb95f3f00d2f6d326e9014006f00fe8000000000000000000000000000bb5800070008000800", @ANYRES32=r0, @ANYBLOB="4c004f00da35c9668534a79ebd52712d2e4dbb304a0b36e1f0f9db25cf8811439f5f82ba168fa2b5bff436f6f45a603de49c40bb1e1db7d1fec996f0c30911b8beceb62c974931f52d000000000000"], 0x160}, {&(0x7f00000007c0)={0x694, 0x32, 0x2, 0x70bd2d, 0x25dfdbff, "", [@nested={0x280, 0x6d, [@typed={0x8, 0x10, @ipv4}, @generic="16e5ac49aaf258a03820687ba5f9e9ab5539d99706e37fe8ab9e09cace00dd82e53b4a1c410636e7569b974a8e8899cf44df68edcc3a9c49b8a5715c90af9c66134e85296cddb4e798f0f1754363e09a9c25014cb4ca6fdbacb5b01fe39f08d50db093289afec004ce772aa09f1548cdf3", @generic="a7a870cf1da2f28f20ec42a75824349da0ba146811d22640ed6f64999fcf12f3ee32e3448aef2cacf8c68c05b107ea83d90df786ae72bb9acbcac0b303aa5eeb62fa359c8c1cb870329502b7d40d41fbdcfd3357eb88c0204308878dd78159048c7494abf83751738d2aa7e8a1f2a12cb62b39ef0ee4f0dd42febe6f1587e615336232aa2d54ea0d1dd8eecd7831f3952a213f990d0127b5dfac592d1f1af79514d574f3e80efd3d66aed3", @generic="a767fe97ca8d4769090a383639861fd8a99af309d89053eabe147a80b9e0f88c9a3ba0e621984f6025323e0352115c6c99d647f0b7806928f350c7022d3514ef62732b827935c4977edfbc138321e035c4c794cfb1c644a233452755c5b962064bbe689515fa9abdfbc5671d0e7ef2788768cccd46c80f26ee804cda8d8f67faef55a62b810513cc52ebd0c209789ba5f8f8b346406616a3906e150566d498e6b3e4681040b6b78ddd8a8d518a8ac140e1b0ff5de0103866b317fd420cc17f5ac7333a56da1adf9fd50ec6fe57d5365c23ec38ec0d29e9ea09bf6653425dce9842fca5d618f29f644ade677d", @generic="b8ec12b3e1f33d63a4f1ebbef06418fbd6468edf45caa2745933ce0ae17e782b849b27d53159f66c9a7893c465e216e60488674145ca54bc70f7116f9b79da027cbf1df4317ffa11935fd808f27568f709b643c9a090efa0d2a49949b0ae826eed876856ab6a24d3cd"]}, @generic="9a96695d2b5206cecbb70862dcedc2cdc1240a98caf317f804dfcd9f0b198b74048422cc78a1f44681b5dfb9009c31e42d7529b56946a41f15072ebac3eb368ad99816292ecd92f7734a0ede41432f835ed259403b915b8dd9df5d59aa1cfe76cff8e2aff5de826b14c5f1e25ea7a18762dcac90924eb5661d9b65090b4cced4530409dc21e0fcf93073bb9ca485d489270746072d83a5f6da73a40f58d47d746a35eae1abb3c90fe738dec523c535f3467e3c9a55dbd20373f1c3dac5ccc0f9b2ca1f6acdb151530e2067da5c78ba9282d4f89ecd1abcca74f0f8a8a77d14e9", @nested={0x250, 0x54, [@typed={0x88, 0x6a, @binary="ee9fca183d9479fe9e0f0a471cede46f165485002038b18dddd899831921b54206c6450fa65c0af221f0684287a11d96320694fe1a9d2e2dc43d588fc616e18e654fe9e4fe021e07ad5164341162891918dc7226984bcbc538a3a8490efb794cedf66262a93a8fb111866b84481735608cf9faf1a2d3791a546f841b854eeb5b365e"}, @generic="ddd417d0dff47c14f244a77fe7f4e0e823ae315bf61c91decba0aed51993433997895f2c139ad9f0fb9f2dba12ecb537912b31ede261cefef5f62ac35bb327f0f77145783bc2780007fd9761891528dd8dd163b0d393bf5187007b8eb9ea3e60380951e31cde0ed4e0a390e1c9bf92e3668f5cf385e4910031d2aaf908c5cb32702f31ed240730e9791b6cc97d7e10e3df08d2316d1aecc69519690a3e2ab75917a54c06709cff663007b9ca6e088bdafa", @generic="325f03bb62a3995650fac67e14afc28d9c464a042f0dea45a8188974eea2f0ab469a15e393d177a181331e91bc1e9827858442df7758a49ff4c42d19b19c6c9fd3542ca953af0054a4f2ffd070738434dfe488a0a71a63fd2aa52c049096d5b402c321f13ea7aded23060ae716dd721c9181f62af5f4cf7c6710078e4875cba25c96f9ac4a3cdabe169fc69595ead54eeb5931c6e1a4ec0845c6c7ece1dad0ec1ac22554ad988fe516f033c34396dcaf7ea8e6c35a64215c8ab21bb11cd4aed7b8a605151ae7d01486c09a058876e73170f94fc7ea127d5ec318ac04103652f622184eae261370479b", @generic="a6", @typed={0x28, 0xf, @str='seqiv(rfc4543(gcm(aes-generic)))\x00'}]}, @typed={0x8, 0x46, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @nested={0xc4, 0x57, [@generic="f8fd1cbd6cad6e9aab40902d910b10e80bcc21a86a99b2fc890fc1561deeec4100b68eb702c803e8cb26815457424afc70c1099d6395b95f6be5036a8924a4be5c0716dbcdc7e9e206e8a20d9cff9e38c28d6eab9e81367fb3e60fa32e239844261837d5847b58c08a604a9f55b2dc1616c4db8ff1a341e2c5dfcaba411dfa86510de1df10e2aac8d4b90742990eb03f45d207de7fb13cda4ab39478a4c1f9aaafe096d61798541777daf7d8567274f2d3cc1087b16309393befcdecb23b7b"]}, @typed={0x8, 0x16, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}]}, 0x694}, {&(0x7f0000000e80)={0x119c, 0x30, 0x400, 0x70bd26, 0x25dfdbfd, "", [@typed={0x8, 0x25, @ipv4=@broadcast=0xffffffff}, @nested={0x102c, 0x47, [@typed={0x8, 0xc, @uid=r3}, @generic="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", @typed={0x8, 0x2b, @uid=r4}, @typed={0xc, 0x56, @u64=0x1ff}, @typed={0x4, 0x7}, @typed={0x8, 0x56, @u32=0x4}]}, @nested={0xc, 0x1d, [@typed={0x8, 0x19, @u32}]}, @typed={0x10, 0x3, @str='cpuset*&{\x00'}, @generic="a2e99dc2b1b2c4d5324f937ecf78b2324cca7d90787f47b11532efa7a168b3c4b575f53e8724e2cdd531356144dad65e16522b43220398c065769e228102afa19bd9e9939340004d02375e3cc2ee0f6e3835113a39a8878353f404ad8cd19be12fc9196750021ea810ca73cef92bdec1bbe1679aa2a51569f4c2a5285605da5da2e423caeddb16a99fc7592998d4193b06ef4a069366df9ae2b355d5fe4a366227721e54d6d55a83b4c223fcca9a27", @typed={0x8, 0x34, @fd=r0}, @generic="8ea01db8fc95519cb8024c8024b90a09d3b09b6448a69d9cc782134ed480d6c2c741ce09ff65c95960ae45e5e34ba84f1de607e508dfa171ccd769a35bb61ed6e4b1bff5ca08bba7490e93dd02163d2aaf03cda7f55fd20d15d7232361482a988a9cea28caa24e0a33f538fa9cbdfd63fffcd4a149c4c44bc0c27071c1d2a942d0747e"]}, 0x119c}, {&(0x7f00000005c0)={0xdc, 0x29, 0x0, 0x70bd28, 0x25dfdbfb, "", [@nested={0xc, 0x64, [@typed={0x8, 0x63, @u32}]}, @generic="1347dce4b4d2241c4fe57eb6220aacecf826c6fcfb0857300345ba5bc29a83ec575d48d42f94863a59", @generic="47489ad874af888bf891b2f9e9696fa43d6eec6623f98742adc436238cfed347e07a57babfa3e5efbdb120d1249b07fd3cc0adfac7af09bdde2622a8e696be05a6897a7f1cf99ba1dc446fb98ba66365556ffc5a0b3615a87d0e8db2a800d1b8244627fa7b58ee1eeb14255050c7bd420f54740f0af64874888eabfe1ad481ef05cac5dab3f06fdc2e6dc55d9e5f8fedea8fb838b9e4"]}, 0xdc}, {&(0x7f0000002040)={0x224, 0x40, 0x300, 0x70bd2d, 0x25dfdbfe, "", [@typed={0x8, 0x81, @pid=r5}, @typed={0x8, 0x1d, @pid=r6}, @generic="62c4aa2fab1aef0656332a39ff254ef615b116e933", @nested={0x1ec, 0x6f, [@typed={0x8, 0x70, @fd=r1}, @typed={0xc, 0x3a, @str='aead\x00'}, @typed={0x14, 0x13, @ipv6}, @typed={0x4, 0x8b}, @typed={0x54, 0x53, @binary="6abf8e284815f95fd40cdab263d977d6fff9a9e25f8b9ad6de58a885374fbb7dffd1c4f5f18f0ee5fc937e54321a6e04c2088bd774c4d33066b9c96ba00a574ccf93c434a097d7c2f9d2811dcef9a8"}, @generic="753fa4a511c80c43c9984299b5d1ca70e638ab6861a13503beb0ae438825e02d99ec505911996829b0b6243c9722ab306fe848667a33e1928e2dad8c1b9b4b0a709a04e91eb14c26316fdaa2a9ef32225b0912a4fc26813b0461b7722fc623970db36816934d4d4d5d61672c0f19ecdaf77ceffe4be510678672e89276396ba48fcf630a6efa8002d79a454f6bdda37d1b8294a38222fb775f62789dcbfac66405b36d3151852f7373e0f88292cf483a8e5f0b80e9844526566a323ee215cd21e299d5350d1f26d008e30a93ddbc915abb44664ce2f71eb2883d0b71a9070096190d8fc9", @generic="878b0f062c03d7736646f9c4dae7cdb8a9678ea2c397552017743f8b5b567ba8e98f333d9f1e44e5ee2136ec9f6dc0d1ca22efbbea7f4b8fd01670b22b855b3cd6df022067cf2e89458309e9ab6547ae11a6be44d6e498f36454b50f42e1d322007da253fddce3588e19c50f14f4", @typed={0x14, 0x56, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x224}, {&(0x7f0000002280)={0x248, 0x30, 0x800, 0x70bd27, 0x25dfdbff, "", [@typed={0x4, 0x7}, @typed={0x8, 0x60, @u32=0x400}, @nested={0x124, 0x90, [@typed={0xb4, 0x13, @binary="2acc3c878a67e8f31da28b127298257c65c75e30cfe099f73c3f9e9b350859622b2fe7a4249e055143a30fe3c691a3e68f67727d793aa269be160e549a12c2bc627290644900f04a06874d44f7882111d39dcf0143286f50b68922d2120215ae3fbd5485bb2a88839bf20db4761d3d8ed080c286754b18794f593f76687e1d53c508ffc01081eebb2a111d8e6b9137141cf7cdbcdccc01787c47c99c23b32cb898f54ce705dba5a31e4c9cfcdcccc7"}, @typed={0x60, 0x62, @binary="f159d0a986ee585ad38f308e8df0530f18b5af3af1bdeffdd2f57e3a39a1c8d74b2c418e9d6913b38c220189eb055e100b80d33a79cb26d5a4a8647d94287e5ca0dfc274b0e3eec042926ecbcfd6065c9e19287c4810ec6392e3"}, @typed={0xc, 0x78, @str='aead\x00'}]}, @typed={0x8, 0x79, @fd=r0}, @generic="a1ace9318e39569ea4a0ddec88f27ac1690ebf68230bf4a074b101cc37b3da4f6076c770cfa4e2e97974632bff0ae0143fc3b071de1db985894ec5bae8c705e8e023f74715f261a5e1fb9067a586eb710778f8d237cda57e93fea0b65bcbe87e6814376054d1047e7e087aca313d2065dff77d0ee1d2b589947568071e0a60f243cba1f72351a262adc434d75bebba40c1bbe804b95dd8e0adcc7bb315dcd81c395605c80dfe148bcb63cf562f8084dec43640f9e67d5bc6e84a48871c2210da8201bec8c3ce04d4abeb830063095cb69207e5ebe5", @typed={0x28, 0x7, @str='seqiv(rfc4543(gcm(aes-generic)))\x00'}]}, 0x248}, {&(0x7f0000002500)={0x644, 0x37, 0x200, 0x70bd2b, 0x25dfdbff, "", [@generic="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", @nested={0x218, 0x15, [@generic="b6d027623f805e3ee3dd43fb8034ba2345d1b194f5fe78a1b0b3f04fddd715806bee06f9c781221e42e1813f48942865a9cc36c2ee6920641a7434787c2c05ff16c118d6513edbec56b47e3d7a25cce13feaafd66d599fba2a74dd608559bca0891ec727f04bb58bd4572c6c3955ba9021c8f46aa0ffc6710896464ed4a29379d2f40e0df88a746b3762aa3897689f2cbd9f14b92ed9fd86ff392051ad4eedc87b9805add0826a507623c3366bbe662299de77a1db0aad6b71ed70decc4c8d9df550bf1f9324cb0d93e6340a7b2ded9c2f68e59ab1aa898fa833bd05b80c81a3ae2765bb57a0a6e4", @generic="0130e5416a4fefc4a66f655b79340539dcb84b8ada1a0b6cd9b113b252b5bb3ee1da145737313dec4973190360fcaca112ff54e0a5a74635baf0ab917f879b98a8ec574f6b58aa667e950766f4295671b128a3f456a62151e9eda63b7af6a344682cc319fedb4cbf0a97250e05a32f33290c980c8e87540c73d542e37c06d2ed38e2dd464d06a323d4982b9fd6ca", @typed={0x94, 0x50, @binary="e242f42dd7129c439e7c1e73000cd9ab208970c43094af32b92531871fb7c2f799b63c1a40d52669db68adf92007af0e8ff94d975859d768787c4ade63df50a32707d64bd3e21adf29f9d1bb57adf76935543cabbcd9aec416205926d2c82092d7b714b27c9b067f661185f7b303d50c761d2f1ef770d02bced454de688725e251eac6a0e89542cd07eb4ec51069"}, @typed={0x8, 0x76, @str='\x00'}]}, @nested={0x31c, 0x40, [@generic="b1c14be6decd30af76e395a01a29f2542bf39d3c8b2b8b1a2241afa0b736a42107fb316f9feea992004e85d8081bfdd15a2293d61aabcfce03afff8bf663f1e2e62ab35ec6bc526039e802714ee4942ff722ca10f85eb13b0c9dea56ba49e1b84cc07a89ee2ea1f75f8c7c4b6358484b4614bfca821e8ac224affd5e655d1be513ecacdff112c70a669965f256f645b5b387ef34244d823fcfd6ffdaafd86cb08543a1cd37db002bd4ba4426cd4853692968b4cb8d4a8d4bbb0561c0c8a8e31e83e75b7ebf85e471dcdac1b0b59bb1b5bb582db4ff4e724b0883dcf8887f951a3406968c3a767746fec6be5c983211d506209a5379ecbb61291b", @generic="d5bd71daf8fd0f289d0b21e45c404e19c8c872b7b7795868827b5715313a3547fe9056e22d23827ef67b7bdfc8b115fc316ba95be4b37cfa7a08b4ffdaff988a5bd1b9103cfca72e52dd0dba4d23188e57609e84f82a083e6c639895f4d9ae03cd6b2fc79f0f225f63b65ba18a32f2bcaf723829fde91d7e44d5c248497a2387dd4eeb90af4183e480fad6822e47226d", @generic="193cf845ec809a1c17d96fa8d6d2fc18a2eb69cc7b72532663a36f2b7a86a3eee17a086ac56204cbbab6fd3854a45bf0adc7e5d33f8e5766f7dc8fd285f93c92503d0d8d06df3ca6697691", @typed={0x8, 0x30, @u32=0xffff}, @generic="90e0d96c83ac83e16b9d56c8ea26ce94a76b142cb52f1a6b0ed099b2ca5e6f4efa4daf6c36f0185735", @generic="b3bc1455019563cff21ec9ff501b8551638c4e69543e6f6082b1017761e77da15d30b378b5e4c6ad7762d001", @generic="0432299fc7c21501bf3bf177fd83e7509f9c5edc5b39ce51125fcfdf08d56f1cd97b2a94f3d8f522962364dc9a4eeb7ed89d512bea2960d17a335a6d890b27d7d511cd21833f84afa90e23865b2fb44efd8681b93d865e4de775cd9abf013ee0d404194bbd8c6a01f43b6cfb622a2cad5fc34ef92a755b3fefaf5b03f69867596457370260909cf0a1056d9268f1c9507b16f43af42fa0df507ffd1dffa0ceeaa33fce69e7f311ab245f0ecce528305f25f959722d02fd905eaf247ababc6bc92b832e4d9bddfbd53d946afba7b69c1c54b82c1f37f6de6b3353926fd8dc196b420674"]}]}, 0x644}, {&(0x7f0000002c80)={0x2b0, 0x2c, 0x104, 0x70bd2d, 0x25dfdbfe, "", [@generic="abc6bacccd12b649edfd6c0c1f4578309d7f87dbb73900a09b8e0835fbddadf624014109c9d928478a51c7310ab560dbf2684c05c446e75b90c9665da04e66281b940a2c5ee7d7670313db", @nested={0x1c8, 0x27, [@typed={0x28, 0x25, @str='seqiv(rfc4543(gcm(aes-generic)))\x00'}, @typed={0x8, 0x81, @uid=r7}, @generic="ed9978823b6d2aa1aed25a893edf88815147f076e9eba0d2a95d17a75e2febf88c7842097f3aea017dae763fb9f0294e10c9db47587c57c2c86885edb3a5eb72d9b88f401cc13684e28067a14038ec83057a3d3a350d03133147fea4313371bc70611f76b819c0d5", @generic="38bf628b6ab6e8fb81e8a3e5c126516915b7c256dc50eaf9a9d945a119a235b035b7c0f26ffce87dc51a87b0376b8e94737d4cebbdccd090369b01babcf10f33ae8b87d0332792d978620fa22bbd591fb51a61c9ceb7c5bd48430d6ac38e54c71b0ce241828e2ee91a72e6180e004fd828c2", @typed={0x4, 0x34}, @typed={0xac, 0x1c, @binary="aa49473d51a15dd2a043ad8ebd2d70e5dd4743b924a016e16a17ab62c7c35b2284a912433b6fcf55990eed8996a4d7a31f2b38e92653639b9e06ab1761c527374347600eef1bc86c02aabbe465bb0c2c057306dc1b10c293fa49f2959bceddaf27a776258ebbe4e1f73e31daf2f097e22f03858819076b3b2d441084f0b98e60bf45a2bdffa3217e65496b87eb7883ce23b248c8de1a997e6b1248210501caa5b615a3702447efd1"}, @typed={0x8, 0x81, @u32=0xfff}]}, @generic="51e97f3f4f3ba96d4f0744c0315ed82461d7a7f854fb5b263bc99e776b4230089e740530e6f501ac217189d2df1b9f72e1c6af0f944578d617dff23753788075a849bb88b2b2fea4dca434a63c141d28d458f0c436c90633fc107948070239c50890b3520314cc76a7ada15a73073efdfe21d7c1ae9bc2259884e8f24cd67c33aa4cad6fa26f8b502ced"]}, 0x2b0}, {&(0x7f0000002f40)={0x118, 0x17, 0x300, 0x70bd28, 0x25dfdbfd, "", [@generic="68f2e7fb55c61151796de3dd5b8234475fea94d217d360156d1fd6c6b22b39e00ecb1ba45832761e13995d30081069fc97e0fa30a43aae1a61385673b997b453ca269f090a9147a08632", @generic="fabe900bc2774c2752a4ae9112c51d0f03021732c441654a0daf622ff8bec2a5f0a06eb262870fdcfd58a3969886ec425de14f7c44ca208ac4c8d457e8cbf451551be09fdbf1c28a2c088f505632d436acf7120b935ec8175ec6e7ebfec19307875842e899a6966126b56fc3a9b0a58b18560f4268439e3b36a126b75327d25e6a18c15d0f83117130ae3b224be040a466f097b5350bb092e84125ff3e137ac55fcdabbd274fd74ba85ad3c0c21780601eb7aa454babe5707734a1"]}, 0x118}], 0x9, &(0x7f00000031c0)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}], 0x20, 0x20000001}, 0x8001) 00:47:08 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030031a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:08 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x4000, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 00:47:08 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:08 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2f00]}) 00:47:08 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_sype\'-/proc\x00', 0x125, 0x0) 00:47:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) fsetxattr(r0, &(0x7f0000000740)=@known='security.selinux\x00', &(0x7f00000009c0)='usereth1eth0 nodev{\x00', 0x14, 0x2) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) process_vm_readv(r1, &(0x7f0000000040)=[{&(0x7f0000000100)=""/70, 0x46}, {&(0x7f0000000280)=""/74, 0x4a}, {&(0x7f0000000300)=""/126, 0x7e}], 0x3, &(0x7f0000000940)=[{&(0x7f00000004c0)=""/235, 0xeb}, {&(0x7f0000000380)=""/116, 0x74}, {&(0x7f00000005c0)=""/66, 0x42}, {&(0x7f0000000640)=""/95, 0x5f}, {&(0x7f0000000400)=""/1, 0x1}, {&(0x7f00000007c0)=""/247, 0xf7}, {&(0x7f00000006c0)=""/68, 0x44}, {&(0x7f00000008c0)=""/127, 0x7f}], 0x8, 0x0) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:08 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300c5a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2740.921240] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\'', 0x0) 00:47:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000002", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:08 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x8000, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000180)=0x9, 0x4) 00:47:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r2, &(0x7f0000000280)="38a1ea5792848e932480579ee013b2367d31e115a679d22f55c72c03455f1a6d7e800de4504b4dae04118f5038ab686ecd15fee8e661c29ba788ce027811cc4f99cb837e88bd78fc951a074496e7bddd415b242d77796e668ceb58dc06c6b50ace5dd7fa94fd1cf0bab2f00754b9a07c638ce6ca5b5d20e959c8bbcfffc68d2d2c274537999a4142431ec26c93683a04e8fe16e0eea21a12175177b388bf0cd340398242366dcd487ead8029ced13658", &(0x7f00000007c0)=""/4096}, 0x18) 00:47:08 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_tepe\'-/proc\x00', 0x125, 0x0) 00:47:08 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:08 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03015aa31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2741.009462] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:08 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x14]}) 00:47:08 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:08 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_typy\'-/proc\x00', 0x125, 0x0) 00:47:08 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000400)={0x4, 0x5, 0x7e9, "7175657565310000000000000000000000eb00", 0x8e50}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:08 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece034800a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:08 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) mq_notify(r0, &(0x7f00000003c0)={0x0, 0x16, 0x1, @tid=r1}) r2 = socket$alg(0x26, 0x5, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, r2, 0x3) bind$alg(r2, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r3 = memfd_create(&(0x7f0000000000)='posix_acl_accessvmnet1proc-\x00', 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x81, 0x200, 0x3ea8, 0x7, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000280)={r4, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}}, 0xb0b, 0x10, 0xd42f, 0x2}, &(0x7f0000000140)=0x98) r5 = accept$alg(r2, 0x0, 0x0) write$binfmt_misc(r5, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r5, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:08 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766dff", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:08 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x86ddffff]}) [ 2741.196401] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:08 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03f801a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:08 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63e0", 0x125, 0x0) 00:47:08 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', 'security.evm\x00'}, &(0x7f0000000080)='self\x00', 0x5, 0x100000000004) unlink(&(0x7f0000000000)='./file0\x00') 00:47:08 executing program 4: r0 = syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x4001, 0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffd, 0x800, 0x48000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x80000, 0x0) fcntl$dupfd(r0, 0x406, r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="6ed688131fce0c80d179720600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcf", 0x24) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000300)={0x1, r1, 0x1}) r3 = accept$alg(r2, 0x0, 0x0) futex(&(0x7f0000000140)=0x1, 0x3, 0x1, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0), 0x0) write$binfmt_misc(r3, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:08 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:08 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030086a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:08 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xf0ffff]}) 00:47:08 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2741.367194] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:08 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) timerfd_gettime(r0, &(0x7f0000000180)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:08 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030130a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:08 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x800, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000000)={{0xffffffff, 0x2}, {0x4f, 0xffff}, 0x1, 0x4, 0x3}) r2 = gettid() move_pages(r2, 0x2, &(0x7f0000000280)=[&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil], &(0x7f00000002c0)=[0xfffffffffffffffa, 0x915, 0x80, 0x3, 0xa5, 0x22, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x9) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:08 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766dff", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:08 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000004", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:08 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8847]}) 00:47:08 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301e9a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:08 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4954, 0x422000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffff}, 0x106, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r1}}, 0x18) symlink(&(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') 00:47:08 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:08 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030183a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:08 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f6304", 0x125, 0x0) [ 2741.558284] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000280)=""/197, &(0x7f0000000000)=0xc5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x20000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0x1}, {0x0, 0x3ff}, {0xb, 0x7fff00000}, {0x2, 0xffffffff}, {0x4, 0x7f}, {0x2, 0x5}], 0x6) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:08 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xd]}) 00:47:08 executing program 0: stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:08 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03fc00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:08 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known="73656375726974792e65766d12", &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530a8", 0x0) 00:47:08 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f00000002c0)=ANY=[], 0x27f) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:08 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'cpuset\x00'}, &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0xfffffffffffffec2, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:08 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffff000]}) [ 2741.744923] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:08 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03a801a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000006", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:08 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63ff", 0x125, 0x0) 00:47:09 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xa000, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r3, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r3, &(0x7f0000005180)=[{{0x0, 0x0, &(0x7f0000001600)}}, {{&(0x7f00000016c0)=@in6={0xa, 0x4e21, 0x7fffffff}, 0x1c, &(0x7f0000001b80), 0x0, &(0x7f0000001c00)}}], 0x2, 0x0) socket$inet6(0xa, 0xf, 0x9) getsockname$llc(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x10) 00:47:09 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:09 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x88480000]}) 00:47:09 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300d8a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530a1", 0x0) 00:47:09 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2741.885263] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:09 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:09 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2c000000]}) [ 2741.976062] nla_parse: 15 callbacks suppressed [ 2741.976070] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2741.989216] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:09 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000180)={0x1, 0x0, 0x619, 0x100000000, 'syz1\x00', 0x3}) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:09 executing program 4: socket$bt_bnep(0x1f, 0x3, 0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = dup2(r0, r0) r2 = accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e23, 0x3, @loopback={0x0, 0x1}, 0x3579}}}, &(0x7f0000000340)=0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e24, 0x2, @loopback={0x0, 0x1}, 0x9}}}, &(0x7f00000004c0)=0x84) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000140)=0x200, 0x4) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) dup3(r1, r1, 0x80000) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000000)='aead\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r4, 0x10e, 0x5, &(0x7f0000000040), 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x185000, 0x0) 00:47:09 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2742.039396] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:09 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\f', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:09 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xe80]}) [ 2742.086867] QAT: Invalid ioctl 00:47:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:09 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03016ca31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2742.139337] QAT: Invalid ioctl 00:47:09 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63ff", 0x125, 0x0) 00:47:09 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03017da31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:09 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='tecurity\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:09 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x88640000]}) 00:47:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f0000000700)={&(0x7f00000004c0)=ANY=[@ANYBLOB="740100000000000025bd7000fedb0525000000002a8316af17463811cc9984fc32f01d3f8cb33673fa6bcc8a66c2adc37fefa9dd65c897687df0221625e858fafce8c6ec9491e48b11ca26c254515eec0246a2da5588053c3d0cecf766243a43a1446d42c0a3d8bf901a1e52fd6d6b355a5bd2ad57c8e9903649660637d2afc2409b755a79841dc7c27a665a7ae70d56af037e1a4f", @ANYRES32=r2, @ANYBLOB="0f00fffffbff000006001000400008001c0001006d0004000000000002000000000000000000000005000000040002001c00010003ff0400030000000000000002000000010000000800000008000e000600000008000d00920000001000010066715f636f64656c00000000440002000800050004000000080008000500000008000800070000000800040001000000080004000100000008000700000000000800020004000000080006005e0000000800050006070000a40008001c000100050003008100000001000000400b0000b20200000700000014000200120002000000000001000000f7ff0000100002000800070000000300020000000c00020004000800050002001c000100403e0104040000000300000008000000000100000800000018000200ff7f0600040002000400c70002000100ffff00001400020009000800ff010000050021ff001007000c00020001f85c0100000500"], 0x174}, 0x1, 0x0, 0x0, 0x4000040}, 0x4804) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r3, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2742.180746] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:09 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x40, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000280)=""/125) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000180)=0x7, 0x4) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:09 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300dca31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:09 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2742.318514] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2742.327116] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:09 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='uecurity\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) socket$packet(0x11, 0x3, 0x300) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:09 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xffffa888]}) 00:47:09 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000080)) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:09 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2742.359851] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:09 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='sycurity\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:09 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0345e7a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0xffffffffffffff08) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) accept4$alg(r0, 0x0, 0x0, 0x80800) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:09 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8847000000000000]}) 00:47:09 executing program 0: stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:09 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63ff", 0x125, 0x0) 00:47:09 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='secsrity\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2742.514902] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value [ 2742.544736] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000000880)=[{{&(0x7f0000000100)=@can, 0x80, &(0x7f0000000980)=[{&(0x7f0000000280)=""/222, 0xde}], 0x1, 0x0, 0xfffffffffffffe78, 0x9}, 0x6}, {{&(0x7f00000003c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/97, 0x61}, {&(0x7f0000000540)=""/172, 0xac}, {&(0x7f0000000600)=""/172, 0xac}, {&(0x7f0000000900)=""/90, 0x5a}], 0x4, &(0x7f00000007c0)=""/131, 0x83, 0x200}, 0x7fff}], 0x2, 0x0, 0x0) 00:47:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:09 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece037900a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:09 executing program 0: symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0xc) process_vm_writev(r0, &(0x7f0000001880)=[{&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/129, 0x81}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000280)=""/27, 0x1b}, {&(0x7f0000001500)=""/135, 0x87}, {&(0x7f00000015c0)=""/202, 0xca}, {&(0x7f00000016c0)=""/219, 0xdb}, {&(0x7f00000017c0)=""/176, 0xb0}, {&(0x7f00000002c0)=""/17, 0x11}], 0x9, &(0x7f0000002e40)=[{&(0x7f0000001940)=""/201, 0xc9}, {&(0x7f0000001a40)=""/175, 0xaf}, {&(0x7f0000001b00)=""/247, 0xf7}, {&(0x7f0000001c00)=""/119, 0x77}, {&(0x7f0000001c80)=""/4096, 0x1281}, {&(0x7f0000002c80)=""/210, 0xd2}, {&(0x7f0000002d80)=""/148, 0x94}], 0x7, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:09 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63f6", 0x125, 0x0) 00:47:09 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xf000]}) 00:47:09 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='securisy\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="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", 0x165) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x228800, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040), 0x4) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:09 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030181a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:09 executing program 0: stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = pkey_alloc(0x0, 0x1) pkey_free(r0) lookup_dcookie(0x0, &(0x7f0000000140)=""/124, 0x7c) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:09 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:09 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x4305]}) 00:47:09 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='securite\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2742.743256] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2742.771088] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000001", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:10 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03019ca31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:10 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530f0", 0x0) 00:47:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x1a1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x0) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:10 executing program 0: stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = creat(&(0x7f0000000080)='./file0\x00', 0x142) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2b2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000340)=""/242, &(0x7f0000000180)=0xf2) unlink(&(0x7f0000000000)='./file0\x00') 00:47:10 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\losser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:10 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8100]}) [ 2742.883583] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:10 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louter^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:10 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63f0", 0x125, 0x0) 00:47:10 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece035401a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20400, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x5, @ipv4={[], [0xff, 0xff], @rand_addr=0x24b17b48}, 0x80000000}, @in6={0xa, 0x4e21, 0x35000000000000, @local={0xfe, 0x80, [], 0xaa}, 0x8}], 0x38) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:10 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000180)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:10 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x3c]}) 00:47:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:10 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece034600a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:10 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x2a, 0x3) unlink(&(0x7f0000000000)='./file0\x00') 00:47:10 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:10 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louuer^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2743.077728] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:10 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000]}) 00:47:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:10 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63e4", 0x125, 0x0) 00:47:10 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = accept(0xffffffffffffff9c, &(0x7f0000000280)=@l2, &(0x7f0000000080)=0x80) getpeername$unix(r0, &(0x7f0000000340), &(0x7f0000000180)=0x6e) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400)={0xffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, {0xa, 0x4e22, 0x8, @loopback={0x0, 0x1}}, r2}}, 0x48) 00:47:10 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece036300a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='seqiv(rfc4543(gcm(aes-generic)))\x00', 0xffffffffffffff9c}, 0x10) read$eventfd(r1, &(0x7f0000000100), 0x8) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:10 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\lousyr^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:10 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x11000000]}) [ 2743.243990] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:10 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f6303", 0x125, 0x0) 00:47:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:10 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece032401a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:10 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) accept(r0, &(0x7f0000000280)=@rc, &(0x7f0000000180)=0x80) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) symlinkat(&(0x7f0000000140)='./file0\x00', r0, &(0x7f00000001c0)='./file0/file0\x00') unlink(&(0x7f0000000000)='./file0\x00') 00:47:10 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdyv)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = memfd_create(&(0x7f0000000440)='seqiv(rfc4543(gcm(aes-generic)))\x00', 0x3) setsockopt$inet_dccp_buf(r1, 0x21, 0x2, &(0x7f0000004840)="db21928dd1740b37c61cb1c13b4953764ec444f7f998d88eecaba0f5931854b6e71539908b46161556453b161e65863ce1b72141d9ab862dc5a4b4d0a1b43fa6057b6cc3e9f75cd9f3e1bc2be2d58cb43a31db8eabe6a398b76ca8fc28d79bd45252139b44a5af893ab2beb26d3ecad976e22b5605170c548227cd281e150c407a24c21c0ff2658ddb560e08adb1618526064573ceb715f2242936afa52bcbdbec3124d1ceb8d0902f9519c8e0f78c976c82e4038f3e0fb3e6e9838b144b9a12f709e2bde1b49464dfd3491abcd98be851a87e0d051b348029a57d", 0xdb) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r0, &(0x7f0000004640)=[{{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000000)=""/76}, {&(0x7f00000007c0)=""/4096}, {&(0x7f0000000100)=""/115}, {&(0x7f0000000280)=""/12}, {&(0x7f00000002c0)=""/163}, {&(0x7f0000000380)=""/118}, {&(0x7f00000004c0)=""/200}, {&(0x7f00000005c0)=""/206}, {&(0x7f00000006c0)=""/152}, {&(0x7f00000017c0)=""/118}], 0x0, &(0x7f0000001900)=""/180, 0x0, 0x3}, 0x100000001}, {{&(0x7f00000019c0)=@pppol2tpin6, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001a40)=""/70}, {&(0x7f0000000400)}, {&(0x7f0000001ac0)=""/143}, {&(0x7f0000001b80)=""/209}, {&(0x7f0000001c80)=""/166}]}, 0xfffffffffffffff8}, {{0x0, 0x0, &(0x7f0000002080)=[{&(0x7f0000001dc0)=""/199}, {&(0x7f0000001ec0)=""/60}, {&(0x7f0000001f00)=""/115}, {&(0x7f0000001f80)=""/224}], 0x0, 0x0, 0x0, 0x3f}}, {{&(0x7f00000020c0)=@l2, 0x0, &(0x7f00000037c0)=[{&(0x7f0000002140)=""/166}, {&(0x7f0000002200)=""/247}, {&(0x7f0000002300)=""/143}, {&(0x7f00000023c0)=""/200}, {&(0x7f00000024c0)=""/235}, {&(0x7f00000025c0)=""/145}, {&(0x7f0000002680)=""/4096}, {&(0x7f0000003680)=""/49}, {&(0x7f00000036c0)=""/227}], 0x0, &(0x7f0000003880)=""/173, 0x0, 0x2}, 0x1000}, {{&(0x7f0000003940)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x0, &(0x7f0000003a00)=[{&(0x7f00000039c0)=""/46}], 0x0, &(0x7f0000003a40)=""/167, 0x0, 0x1f}, 0x7fffffff}, {{&(0x7f0000003b00)=@can, 0x0, &(0x7f0000003e40)=[{&(0x7f0000003b80)=""/225}, {&(0x7f0000003c80)=""/42}, {&(0x7f0000003cc0)=""/133}, {&(0x7f0000003d80)=""/170}], 0x0, &(0x7f0000003e80)=""/34}, 0xa8}, {{&(0x7f0000003ec0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x0, &(0x7f0000003fc0)=[{&(0x7f0000003f40)=""/126}], 0x0, &(0x7f0000004000)=""/137, 0x0, 0xffffffffffffe9f1}}, {{&(0x7f00000040c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x0, &(0x7f0000004580)=[{&(0x7f0000004140)=""/201}, {&(0x7f0000004240)=""/234}, {&(0x7f0000004380)=""/193}, {&(0x7f0000004480)=""/241}], 0x0, &(0x7f00000045c0)=""/123, 0x0, 0xc9bf}, 0xf5}], 0xf8, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x7dcb}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000180)={r4, 0xa894}, &(0x7f0000000400)=0x8) 00:47:10 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000ff00", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:10 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0x3000000]}) 00:47:10 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03a400a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:10 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8000, 0x80) getdents(r0, &(0x7f0000000180)=""/27, 0x1b) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 00:47:10 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:10 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)ym1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000280)={0x1, {{0x2, 0x4e22, @loopback=0x7f000001}}}, 0x88) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:10 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece039500a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2743.475975] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:10 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)={0x0, 0x0, [0x0, 0x0, 0x0, 0xffffff89]}) 00:47:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:10 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mimy_type\'-/proc\x00', 0x13e, 0x0) 00:47:10 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:10 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)=0x0) r2 = userfaultfd(0x800) r3 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x5e, 0x4000) r4 = socket$inet6(0xa, 0x5, 0x80000000) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000480)={r3, r4, 0x1000}) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x8000, 0x0) ioctl$KVM_GET_IRQCHIP(r5, 0xc208ae62, &(0x7f0000000340)) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r6, 0xc0045520, &(0x7f0000000180)=0xec0) renameat(r6, &(0x7f00000004c0)='./file0\x00', r6, &(0x7f0000000500)='./file0\x00') 00:47:10 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03003aa31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:10 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_sype\'-/proc\x00', 0x13e, 0x0) [ 2743.647743] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2743.656939] XFS (loop3): Invalid superblock magic number 00:47:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:10 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c20000000180c200000008004500001c0000000000009078ca1414aa7f0000010000907800000000"], &(0x7f0000000300)) 00:47:10 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f6385", 0x125, 0x0) 00:47:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(aegis128-aesni)\x00'}, 0x142) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) setitimer(0x3, &(0x7f0000000000), 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000200)={0x6, 0x6, 0xa9a}) 00:47:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2743.709137] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2743.717726] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:10 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') socket$alg(0x26, 0x5, 0x0) 00:47:10 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_tepe\'-/proc\x00', 0x13e, 0x0) 00:47:10 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x2, 0x0, 0x0, 0x1}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)) r1 = accept4$llc(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x800) getsockopt$llc_int(r1, 0x10c, 0xf, &(0x7f0000000080), &(0x7f00000000c0)=0x4) mknod(&(0x7f00000001c0)='./file0\x00', 0xc000, 0x75b030) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0xe69b, 0x10000) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000140)=""/19) 00:47:10 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03a200a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:11 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f638b", 0x125, 0x0) [ 2743.802348] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000003", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000040)) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) accept4$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80000) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:11 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_typy\'-/proc\x00', 0x13e, 0x0) 00:47:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) [ 2743.906688] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:11 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\a', 0x125, 0x0) 00:47:11 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x7f, {{0xa, 0x4e21, 0x1000, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x55}}}, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) r2 = shmget$private(0x0, 0x1000, 0x1000, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000000c0)=ANY=[@ANYBLOB="0180c2000000da4ff622386b0180c200000008004500001c0000000000029078ae141caa7f00000100009078"], &(0x7f0000000300)) [ 2743.948573] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:11 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03001ea31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:11 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f6304", 0x13e, 0x0) 00:47:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) r1 = syz_open_dev$audion(&(0x7f0000000ac0)='/dev/audio#\x00', 0x1ff, 0x0) ioctl$TIOCCBRK(r1, 0x5428) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000a40)=[{{&(0x7f0000000000)=@nfc={0x27, 0x1, 0x0, 0x3}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000100)="65c94d64d01f2873536a36ac682de9a7f48faf15190052f37b8c6441dd58c4431f4109b3b997fe5eb2de3111817aabaf509430eeb562a952a5da2cc86c42453542b3296b2bb97cba2d37147a003b835e6251cc11d2a22f56b47a7a380938f0b1d713cf27403631ac850cc09fb83e4b6e125f07aa0a75dcf9140a9610fd", 0x7d}, {&(0x7f0000000280)="1ccdd80ea20f2c2ed0accbcbbf04d5d6e0cc3ed8ac46d22f27f3cf4ff43d5a62e54c49d5cf7e4b2f694339ab46cf2c113dbbc4aae7ba6504faddeb26ec8b69e01a22faca301bd4352da655c79df1b538fe6eda6de1a3c8ad9a7082ec44e81981a2d21d874377f19c65151de46b06f06c4cabf5e3ba957d45e051b7ced4264f93141596508c74b8f1a8247e814ff3f19aa9cf5f9777475108fc9ddda85d7dd07d5d188106ec924b3e7679605890b3a80a0e77d24db9951b1d2d5077833a0029ef87", 0xc1}, {&(0x7f0000000380)="88dfceecac0c40c3e67daa75ae759f501822d254af2e3510351cb55583becba77d5856ffcd3c4d1cd1dcf20fac79fd4871ae046ec13af700e1864ad3c6e3c425f3d6c58ba6abee155a2794f67521cfe93f8426cfc18e563920654ccf20d3f6f6fa414a1040938cd4934bced0cdef7892d1eabf5025b6fb1c4e35c29d8a319d5f54b300ca81b1b7fa07e682c5602c758ad81bd1409a5d5fafecf476aaaadb02c7cd2c768616cd602a0d88f3", 0xab}, {&(0x7f00000004c0)="009e2ab9a61cdb1dc9bdd9c54253269624b7188c86a18068ca7962ec29ac93c12c5920abdf4ed2", 0x27}, {&(0x7f0000000500)="7d9d45ffd74d34a83bc5d03c541309ba57b22fa91640aa0e4ef076148569214ca7fe7dc570eb0865e03a5ee84294b84098", 0x31}, {&(0x7f0000000540)="89b35865faefb677c2c371f4f50d66115a94b4f2143eecb4e942fbc703996bbc9e499efc774e7bbd9759a8f249c8b25eaf34b752ccbb07fc2b4602cc731828126200f5821678f413a8396fdd4c851bdec769da2bb8d5f9546a3ea389efc56bb421a1d02e8324c208cde47966f50e060c9d83be82a40347ba1120f0fcaac3bbbb06730d0b9d91a4095e28dcc395bb4d0b046243e12e05832ce748ff1147282a6ff1ca4c8a7619db7413ffa6ae099caf1f4be35645744974fa37f24c4460036920946f646352e9620046ec", 0xca}], 0x6, 0x0, 0x0, 0xc000}, 0x7fffffff}, {{&(0x7f00000006c0)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}, 0x0, 0x0, 0x2, 0x2}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000007c0)="87750af86719f0d9466d7a914043ec7ab41a18738eb5054c2f5dc273d664fb3a4af765e042c93a6ec7fc15f954684fe2981f6ca9204212573ec6c99e08c0914664301dea9b63128cf07dffc100d4e194e57b1e0f6b98883d184fcb08ed1b27bfeed2befffb", 0x65}, {&(0x7f0000000840)="77248efa2ba21b5fcdb2b6b412dfe2ffad30387fed75f6be80e22af4aaa44205da39f1cfc2847bcfe9cf88b2ab1674a0fbd765b118440853b60a8d68804990bcc1ea20816d141cbe2440393add30faed1bb046be071b5eb98817023f7c519fe232f99601b13d150111", 0x69}, {&(0x7f00000008c0)="3240bd86d03cf4ba226efe4021074fe15ffe7339b1e15eeb4f6a50d51dfa1ad00ea34accea78ea9781a7e57c50c822eb8c102fcebdaa4d02efcde74b9774cd52ef6ce490c6849b72c79b3c2091bf22e597b5b98e8c5280", 0x57}, {&(0x7f0000000940)="884412b80f43054f1710ebdf7a18d64a056f68edb903e5c66a27e6b3fd60a4a703fdf00226ffa5c862b425166bf1ea6db639c2975388db898421c62d3c302c8db7bcd75d2287f16b2abc99d107749cdc75e8397407c0fb7f67718e17b6fffcf386e9a03dc14d55431dbd0742fb5c5069c4d62db53ec71b0ece89dede7a278f3aaa6daf46f63ff953d3346b328cef6d454375e101388a3547", 0x98}], 0x4, &(0x7f0000000a00)=[{0x40, 0x116, 0x1, "7fa984c2c5fb385812f03d9727a6ba9c3eddd404137f4bc1e8131e22bfa69ae6892118960a8a6d6403fe6cd504"}], 0x40, 0x20008891}, 0x6}], 0x2, 0x800) 00:47:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) [ 2744.027910] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2744.036453] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:11 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\r', 0x125, 0x0) 00:47:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000000ff", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:11 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03001da31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:11 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) recvmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000340)=""/152, 0x98, 0x1}, 0x9}, {{&(0x7f0000000280)=@ipx, 0x80, &(0x7f0000000800)=[{&(0x7f0000000400)=""/199, 0xc7}, {&(0x7f0000000500)=""/196, 0xc4}, {&(0x7f0000000600)=""/255, 0xff}, {&(0x7f0000000700)=""/224, 0xe0}], 0x4, &(0x7f0000000840)=""/151, 0x97, 0x2}, 0x1f}, {{&(0x7f0000000900)=@pppoe, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000980)=""/94, 0x5e}], 0x1, &(0x7f0000000a40)=""/110, 0x6e, 0x43fa6804}, 0x13}, {{&(0x7f0000000ac0)=@ax25, 0x80, &(0x7f00000040c0)=[{&(0x7f0000000b40)=""/136, 0x88}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/218, 0xda}, {&(0x7f0000002d00)}, {&(0x7f0000002d40)=""/235, 0xeb}, {&(0x7f0000002e40)=""/186, 0xba}, {&(0x7f0000002f00)=""/184, 0xb8}, {&(0x7f0000002fc0)=""/248, 0xf8}, {&(0x7f00000030c0)=""/4096, 0x1000}], 0xa, &(0x7f0000004180)=""/37, 0x25, 0x10000}, 0x3f}, {{&(0x7f00000041c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000004440)=[{&(0x7f0000004240)=""/199, 0xc7}, {&(0x7f0000004340)=""/221, 0xdd}], 0x2, &(0x7f0000004480)=""/39, 0x27}, 0x1}, {{&(0x7f00000044c0)=@ipx, 0x80, &(0x7f0000004640)=[{&(0x7f0000004540)=""/207, 0xcf}], 0x1, &(0x7f0000004680)=""/7, 0x7, 0x4}, 0x9}, {{0x0, 0x0, &(0x7f0000004880)=[{&(0x7f00000046c0)=""/254, 0xfe}, {&(0x7f00000047c0)=""/168, 0xa8}], 0x2, 0x0, 0x0, 0x7}, 0x200}], 0x7, 0x2000, &(0x7f0000004a80)={0x0, 0x1c9c380}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004ac0)={{{@in=@rand_addr, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000004bc0)=0xe8) accept$packet(r0, &(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000004c40)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004c80)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004d00)={'sit0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000004d40)={@empty, 0x0}, &(0x7f0000004d80)=0x14) getpeername$packet(r0, &(0x7f0000004dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000004e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004e40)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004e80)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004ec0)={'irlan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000005300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000052c0)={&(0x7f0000004f00)={0x3a4, r1, 0x304, 0x70bd2c, 0x25dfdbfb, {0x2}, [{{0x8, 0x1, r2}, {0xb8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xf1}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r6}, {0x14c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x40}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r7}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x24, 0x4, [{0x0, 0xd38, 0x6, 0x8000}, {0x6, 0x20, 0x8, 0x7f}, {0x8, 0xff, 0x400, 0x40}, {0x3, 0x100000000, 0x7, 0xfffffffffffff316}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r9}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r10}, {0x130, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7ff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x825}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}]}}]}, 0x3a4}, 0x1, 0x0, 0x0, 0x880}, 0x54) 00:47:11 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:11 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2744.165257] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2744.165445] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2744.181423] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:11 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000040)=0x6, 0x4) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000007fffffff", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:11 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03014fa31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20500, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:11 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f638c", 0x13e, 0x0) 00:47:11 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63e0", 0x125, 0x0) 00:47:11 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030051a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000340), 0x800009) 00:47:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2744.339746] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2744.359920] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:11 executing program 6: r0 = socket$packet(0x11, 0x80000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)=0x6) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x4) getsockopt$inet6_int(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)) 00:47:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000003c0)={r0}) getsockopt$inet_tcp_int(r1, 0x6, 0x6, &(0x7f0000000400), &(0x7f00000004c0)=0x4) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x112) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x4c, &(0x7f0000000280)=[@in={0x2, 0x4e23, @loopback=0x7f000001}, @in={0x2, 0x4e20, @multicast1=0xe0000001}, @in6={0xa, 0x4e23, 0x100, @local={0xfe, 0x80, [], 0xaa}, 0xdd}, @in={0x2, 0x4e24, @rand_addr=0x7}]}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000340)={r3, 0x5, 0x4}, &(0x7f0000000380)=0x10) r4 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r4, &(0x7f0000001500)=ANY=[], 0x4cba) r5 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x200000000, 0x400400) ioctl$EVIOCSABS20(r5, 0x401845e0, &(0x7f0000000040)={0x1, 0x39e8, 0x1, 0x3, 0x0, 0x1}) recvmmsg(r4, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:11 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece034201a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:11 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:11 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f6301", 0x125, 0x0) 00:47:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(0xffffffffffffffff, r1, &(0x7f0000000340), 0x800009) 00:47:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2744.482265] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:11 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030042a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:11 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:11 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc(', 0x125, 0x0) [ 2744.558746] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:11 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 00:47:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:11 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:11 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030174a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:11 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x2) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000040)={[{0x9, 0x1, 0x7f, 0x8001, 0xe2c4000000, 0x10000, 0x0, 0x1, 0x6, 0x80000000, 0x680b, 0xcf, 0x1a33}, {0x200, 0xfffffffffffffffc, 0x9, 0x2a6b3052, 0x1ff, 0x1, 0x1, 0x9, 0x800, 0x0, 0x8, 0xf9, 0xad9}, {0x8f, 0x41b, 0xffffffffffffd251, 0x81, 0x5, 0x8001, 0x7, 0x9, 0x3, 0x3, 0x9, 0x1, 0x8}], 0xffff}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)) [ 2744.686211] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)="2e2f66696c6530c0", 0x0) 00:47:11 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:11 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x8000) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {}, {}, {}]}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:11 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 00:47:11 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:11 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301e8a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:11 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63ff", 0x125, 0x0) 00:47:12 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x5a, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [{[], {0x8100, 0x94f, 0x9, 0x1}}], {@canfd={0xd, {{0x4, 0x7, 0x5, 0x2}, 0x2d, 0x1, 0x0, 0x0, "de3abff2621b6adf0d84ea5db619fca2adc876011378ac5d81b4776c7d8f3e950faec309f38154dcf6056009da5d5fc9354421ad4f9fa3e30b44deea0ec1bf89"}}}}, &(0x7f0000000080)={0x10000000000, 0x1, [0x15f, 0xf94, 0xadd, 0x904]}) mount$9p_rdma(&(0x7f00000000c0)='224.20.20.13\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2008005, &(0x7f00000001c0)={'trans=', 'rdma', 0x2c, {'port', 0x3d, [0x32]}, 0x2c, {'rfdno', 0x3d, [0x37, 0x39, 0x32, 0x34, 0x32, 0x37, 0x7f, 0x3f]}, 0x2c, {'wfdno', 0x3d, [0x34, 0x0, 0x2d]}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, [0x3f, 0x32, 0x31, 0x39, 0x37, 0x30]}, 0x2c}, {@rq={'rq', 0x3d, [0x37, 0x3d, 0x7f, 0x35, 0x3b, 0x37, 0x7d, 0x33, 0x31]}, 0x2c}, {@access_user='access=user', 0x2c}]}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6, 0x0, 0x0, 0xfffffffffffffffc}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000240)=ANY=[@ANYBLOB="0180c200000001004500001c0000000000009078ac14144d590000010000907800000000b9a031cdb0db8c80aecc6c47b04b3f6f16f434214a38323540c0e527d725240380a4b08d2fc341130ac52fd9ca0d8930fc614aef67ff1d516cd2c4c6be596e6c29669c38c94f52ea99fcfa5e963425cdd18473342b578690f30f538711526147cdba0a8289e9108babf44a064fbf4e34ad597562accb8bd656af8a5b000000000000"], &(0x7f0000000300)) 00:47:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = semget(0x0, 0x2, 0x42) r2 = memfd_create(&(0x7f0000000540)='seqiv(rfc4543(gcm(aes-generic)))\x00', 0x1) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000100)=[0xee01, 0xee00, 0xee01, 0xee01, 0xee01, 0xee00, 0xee01]) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000380)={{0x8, r3, r4, r5, r6, 0x2}, 0x9, 0x8, 0x8}) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) getsockopt$inet6_buf(r2, 0x29, 0x30508eaa6bc50c19, &(0x7f0000000580)=""/159, &(0x7f0000000640)=0x9f) r7 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0xd0, 0x40) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r7, 0x29, 0xd3, &(0x7f00000004c0)={{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x1a}, 0xfff}, {0xa, 0x4e23, 0x2c, @dev={0xfe, 0x80, [], 0x13}, 0x5}, 0x6, [0xe0c4, 0x0, 0x3, 0x64, 0x10001, 0x3, 0x2, 0x9]}, 0x5c) r8 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r8, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r8, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:12 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 00:47:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\f', 0x0) 00:47:12 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) [ 2744.868961] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:12 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030140a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:12 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:12 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 00:47:12 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8ef, 0x24100) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x3f}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000240)={r2, 0x4d, "93a1e54f36dddb9f50b8f6e3b5d4323c343f9901906ec51cd60a59abcc0444b84070c9a9c47d663d52ffea5ad468ea9a79007b22c3e77fa319e2e8d37f9ec4635a518a7b1b87550dd5f8c1284a"}, &(0x7f0000000040)=0x55) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r2, 0x4, 0x7}, &(0x7f00000001c0)=0x8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x90000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000080)=0x4) socket$inet6_sctp(0xa, 0x5, 0x84) syz_emit_ethernet(0x2a, &(0x7f0000000340)=ANY=[@ANYBLOB="0180c20002000180c20000000800450000c76d000000000090f1f71414aa000000000000002eab562a13bb11ab3dc94f071d32eb3df1d51ddce715ed0216dc5905cca3e9622e04c8b8475f3aff3618f8b08abdb724a7824730774cd0ae24707962bca501f7f6c8073736020b195a6b6a82337525300ee74ff8e6e7165eed9c2f761e65e57e224773d0dbeab9a4314877125bde1b51d6559c942ea72ee43d6a707833e093b2369255304c568e7a94b6349b5bb99ae999036597a28dcc947a38ce14109d18841381eca64c59f5cb"], &(0x7f0000000300)) 00:47:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) io_setup(0x200, &(0x7f0000000040)=0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x511000, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x201, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x123001, 0x1) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x80000, 0x0) io_submit(r2, 0x4, &(0x7f0000000580)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x8, 0x2, r1, &(0x7f0000000100)="78af16efcd5536e51b32dee4965c19688bf3bca29fa4d29be247f9e96318b68f73aa9b8c8f8512effc110c464ad0b5716dc86108d9795a41416a7a23efb75bfb90c58a42d53ef1e4ea4a9a03f513f19a950b71697a79ecc65ba37453f0e93ec2bbc60d10cbd0e3f9e11baceec6a9e189293db93de0039a550e513c9c911e43", 0x7f, 0x34, 0x0, 0x1, r3}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x2, 0x8, r0, &(0x7f00000002c0)="acda8651b1eaa3a4d1fff54b8f8ca8fcc552926c49d5e8e6416cf78e7fa8d635daa3b5d08575caf4e6", 0x29, 0x95ed, 0x0, 0x1, r4}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0x5, r1, &(0x7f0000000380)="d4d26ebedb5eec2a3aa991c77d1327a0913a986d76d9aae07f5695627789ab31be78fda4b207ffb800c6c696c4427af7e8cb8beb06443a8af64dbd1a50737b5b09", 0x41, 0x5, 0x0, 0x0, r5}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x6, 0x100, r1, &(0x7f0000000480)="ce016aede7251cb9a6319ad5667939e7dc79ee1e0e35f7708fc309aa5dd2f2312395afbde38c4210dfc0364a2d22ed33ebfbaf348cd19afdfae299f5e6eac79ca12f50", 0x43, 0x7, 0x0, 0x1, r6}]) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000000080)=@hci, 0xfffffffffffffe16, &(0x7f0000000780), 0x325}}], 0x1, 0x0, 0x0) 00:47:12 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03bc00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:12 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:12 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f638c", 0x125, 0x0) 00:47:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2745.037334] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:12 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f6302", 0x13e, 0x0) 00:47:12 executing program 6: syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=r1) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)) 00:47:12 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301aba31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x20000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000040)=0x80, 0x4) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r2, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:12 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 00:47:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:12 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:12 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc@', 0x13e, 0x0) 00:47:12 executing program 6: r0 = socket$packet(0x11, 0xffffffffffffffff, 0x300) ftruncate(r0, 0x2) ioctl$sock_netdev_private(r0, 0x89f0, &(0x7f0000000080)="f6952e91f0fb1f2630189de6684c6e462c3ece82cb66e556abb1e40a37f7f4a405282606be191b47e9c66b26307637385f3573550147b6457032d697c63e087660156924dac3d8a8e586d136ada28d1ca1b1c57a52a04dbe60b5794df2e649530c587cd201c0a8d859") rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x4, 0xad2d, 0x2, 0x7ff}, 0x3}, 0x20, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)) 00:47:12 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:12 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 00:47:12 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030114a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2745.209298] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x2000, 0x0) getsockopt$inet_buf(r2, 0x0, 0x2a, &(0x7f00000007c0)=""/4096, &(0x7f0000000140)=0x1000) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x10040, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f0000000040)=0xe753, 0x4) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:12 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)) [ 2745.272626] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "0000000000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:12 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:12 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\f', 0x13e, 0x0) 00:47:12 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301dea31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:12 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:12 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030901a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) r2 = dup3(r1, r0, 0x80000) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000040)={0x40000000}) getsockopt$llc_int(r2, 0x10c, 0x3, &(0x7f0000000000), &(0x7f0000000100)=0x4) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) [ 2745.408989] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:12 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) mkdir(&(0x7f0000000000)='./file0\x00', 0xc4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c20076000180c24228239faa9d70631c0008000000009078ac1414aa7f0000010000907800000000"], &(0x7f0000000300)) 00:47:12 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:12 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63ff", 0x13e, 0x0) 00:47:12 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:12 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece039201a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:12 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63ff", 0x125, 0x0) 00:47:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000500", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) [ 2745.534866] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000100)='vlan0\x00') r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:12 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:12 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f6306", 0x125, 0x0) 00:47:12 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:12 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301b3a31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2745.614959] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:12 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) r1 = dup(r0) ioctl$KDDISABIO(r1, 0x4b37) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x80) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="e000000100000401000000000300000000e0000001ac1414bb000008"], 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)) 00:47:12 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:12 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = memfd_create(&(0x7f0000000280)='mime_typemd5sum\x00', 0x1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r2, 0x0, 0x70bd29, 0x25dfdbfc, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x2004c084) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000001500)=ANY=[], 0x4cba) r4 = accept4(r3, &(0x7f0000000000), &(0x7f0000000100)=0x80, 0x80000) getsockopt$netlink(r4, 0x10e, 0x6, &(0x7f00000007c0)=""/4096, &(0x7f0000000140)=0x1000) recvmmsg(r3, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:12 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030016a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) [ 2745.782797] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:13 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:13 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c20000000180c200000008004500001c0000000000009078ec1414aa7f0000010000907800000000"], &(0x7f0000000300)) 00:47:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:13 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0301d0a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x14, 0x800) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000140)={r2, 0x1acb, 0x3f, 0x3, 0x2, 0xfff, 0x5}) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r3, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:13 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:13 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:13 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03018fa31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:13 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c20000000180c203000000000000001414aa7f000001000090780000000000010000000000000000"], &(0x7f0000000300)) [ 2745.957346] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x10000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r2}}, 0xc) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000280)=""/171) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r3, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:13 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63ff", 0x125, 0x0) 00:47:13 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:13 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030071a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:13 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x0, &(0x7f0000683ff0)}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x2, 0x40) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e24, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x200}}, 0x1, 0x5, 0xffffffffffff0000, 0x8848, 0x42}, &(0x7f00000001c0)=0x98) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="00000008004500001c30000000009878acdcca55a0fc9f70590e1414aa7f000001000091780062ab0000"], &(0x7f0000000300)) [ 2746.125667] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:13 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) 00:47:13 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece039c00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:13 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f6306", 0x13e, 0x0) [ 2746.168268] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\t', 0x0) 00:47:13 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x440000, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x10000, 0x8}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0xffff, 0x20e, 0x7c72b30c, 0x80000001, r1}, &(0x7f0000000140)=0x10) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000180)={r2, 0x1, 0x1}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000000000)=[{0x2000000006}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000200)=ANY=[@ANYBLOB="0180c20000793486174bafbaa2583265000180c2000000080045054fa32a163d2d661514ecb017b2b6c900001c0000000000009078ac1414aa73bfe775dceeafa28f079d377f0000010000907800000000"], &(0x7f0000000300)) 00:47:13 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:13 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece031d01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:13 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0x4cba) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f0000000180)=""/3, 0x3}], 0x2}}], 0x1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 00:47:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:13 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:13 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03d200a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:13 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:13 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c20000000180c200000008004500001c0000000000009078ac1414aa7f0000010000907800000080"], &(0x7f0000000300)) [ 2746.371643] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000680)=""/251, 0x2428) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') lseek(r1, 0x0, 0x0) 00:47:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:13 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63fe", 0x125, 0x0) 00:47:13 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece035f00a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000007fffff", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:13 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:13 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3ff, 0x1) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000040)=""/109, &(0x7f00000000c0)=0x6d) 00:47:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa, 0x100}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(r1) [ 2746.542856] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0"', 0x0) 00:47:13 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f63e0", 0x125, 0x0) 00:47:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:13 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:13 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece0300a9a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:13 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c200005d0780c20000f725004500001cffff000000000000ac14ea028651e141f0ec404e6ccf53b4807a9d2b493568ad2238d0ed41d277218126714308341884ba1c55ba125795ab7db3a8b30422ba8dc1b1b0fbf2acbb2248e0f8b396472d281c80853617a5fc7475ca1080dfceb4ee46a9b8e4bde795eb33234e9f6cc8322f950c40da9b370edf25f66b2a3ce0a2c5dfc3f7afabf9882fec09000007651f05563fed0000a27e2963d185875def1e4ccaefa6e6b7f72df90afcc8d69b94a9b9b792783b6c3e4dd14e0509"], &(0x7f0000000300)) 00:47:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:13 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:13 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f6303", 0x13e, 0x0) 00:47:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:13 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03018da31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2746.718250] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:13 executing program 6: r0 = socket$packet(0x11, 0x100000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)) write$binfmt_elf32(r1, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xf1, 0x1ff, 0x8, 0x7fffffff, 0x3, 0x3f, 0x7, 0x360, 0x38, 0x315, 0x1, 0x1, 0x20, 0x1, 0xd6e, 0xff, 0x2}, [{0x70000000, 0x9, 0xdce, 0x1000, 0x2, 0x5, 0x6d9b2ee8, 0xb4d}], "4d46292a0b2351766d3585e77ffd327aa3c5e8f7c660befc8704c7fd10076a55fbbd8935cabb402d1277ae849d85ca935056841a79a3662f87d29238189b75d511b67e7791aea74e76415f42a63be6c16c2441966a9dc06a14e5f0e5ed", [[], []]}, 0x2b5) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f00000000c0)={'team0\x00', 0x1}) recvfrom(r1, &(0x7f0000000100)=""/54, 0x36, 0x10002, &(0x7f00000001c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx\x00'}, 0x80) 00:47:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) [ 2746.855700] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:14 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030135a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:14 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:14 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:14 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:47:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000200", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:14 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)=""/175) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) signalfd4(r0, &(0x7f0000000100)={0x6}, 0x8, 0x80000) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)) 00:47:14 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:14 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece032c01a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:14 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:14 executing program 4: r0 = semget(0xffffffffffffffff, 0x4, 0x20) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) semctl$GETPID(0x0, 0x2, 0xb, &(0x7f00000002c0)=""/166) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) semop(r0, &(0x7f0000000040)=[{0x2, 0x80000000005, 0x800}, {}], 0x2) [ 2747.442732] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:14 executing program 6: r0 = socket$packet(0x11, 0xe, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000100)={0x5, 0xebd, 0x7f, 0xfffffffffffffff9, 0x5, 0x5}) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xa286}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r2, 0x5d, 0x30}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000200)='/dev/input/mice\x00') syz_emit_ethernet(0x2a, &(0x7f0000000080)=ANY=[@ANYBLOB="01801731880a7f216ddcbefdc20000000180c20000000800450012d90000000000009078ac1414aa7f00000100009078000000009f2bdf0fe9699bc45eae18fdff7a6efea3deec8a37b5a5dcaad1269fe842cf0dc4a5bcc4a047eb347921c7c4960d04"], &(0x7f0000000300)) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x27, 0x6, &(0x7f0000000780)=[{&(0x7f0000000340)="a2fb05c08af74130b747a457407d83f495ffce66533d92b266c6d09ed55713000b30240b1291a12f3e49b3f58cad7a419c32b7fad8007fcedd4bdac7f3cd98a7888479e0b68c5448e30bf77416eca73222148e94c8daaf3f88a89a249271405a4f5ded71698a9ddecd0ee7", 0x6b, 0x100000001}, {&(0x7f00000003c0)="3426bc2a3a82d08510577c0874815fba105012fa2224b0a4357ced4fbb24b41254e8d6ea661d6c78c20bb7835973c4b1a5cc86098d3cd2e31cf78f7556f77ef557539a4cfe7731748e017fd1d29384c687458d539b0847b59eecf40940c8a68d88e252f0314bda9be400b7a8f8e949d50756a9942e3a6fe927a7c4eec5c8efc774775374d52bdf2a45baeb6bc0dd91e4ac51f8b85639289123cde95e44f5d8c5c101b80ab9df3ce52922d4cdd978af7972cd83c464449ede6b13aa69c97e82c1d2b2", 0xc2, 0x8}, {&(0x7f00000004c0)="eedc4e199e83339d55ba431464bec239e221dcd80118073df92db2f3847fbb67de43df9a93141bae55ef6aa272a942a631cbea3c6b0967929db15279e02ca3963dbf0bbabec8d2968aea629e5d29183a4227bf80a5d86835187a5ffff1dd300a99df591b2df8433e91e49b954121298509da3d408dd995328d63c94e04d291710efc0678def2bbdca3705099c76d75d4537b8bb78677702e98aee476966b150c5a5ab094512cfd1fae4fa6e8fe364c6eddb470b47d8179cb99395a1f8998295183df1e1a57ec00f9f88e35f41eea538c8a07e416bb7f4eb86892d1e2810fd435a2cdb668bdd40596ed6d6032e61f34a8", 0xf0, 0x7fffffff}, {&(0x7f00000005c0)="aba9aceeb87525a8450d924a2e85d0a89ed95206ff8dd60961b6d742b4bccfc699850bb53fe5da24cc44a8477bfc1ec8c8f16fe3aacc2312a85bc6d32f92e3820193821d083879e07c89dfeb489c2e73a42e5282b729e09822ea394d57f080cc6f8b69307ba804e02d10bf66082a5149eca5cea7e2fcd4a52186878b3d4287d8076b94", 0x83, 0x9}, {&(0x7f00000002c0)="7b1a978febc6069c1701a71b12b91629dd7d170937b4f003", 0x18, 0x16c}, {&(0x7f0000000680)="84ff38e632817faaa9079a460f4b8848a96cb8053f510885390d066baf0e799537ca2842331e982042e75b5c7c454813547411d5e2574c93db336c505fe18d09d8b7a93f46d6fdf6e56ceac8c5722296d7f73064618d783f5d927ec1ba18a8f14eae290399aed9543edb29285f4c4f09fc58121d4d4520f24d2732deb71cc44c21971f45a07c18913d61ee6776fef1b5a3ed3d54c1e0ca80fb28c2e7b14d357d299f4cdf0c564f8558e662a717e5f427f3a86aca5d0025053634103919cf757004d8d18b8dd686b29fceef3ee1e60209", 0xd0, 0x100000001}], 0x80000, &(0x7f0000000840)={[{@session={'session', 0x3d, [0x33, 0x37, 0x32, 0x3d, 0x3f, 0x0]}, 0x2c}, {@creator={'creator', 0x3d, "ce3eda65"}, 0x2c}, {@session={'session', 0x3d, [0x33]}, 0x2c}]}) 00:47:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000300", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:14 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\a', 0x13e, 0x0) 00:47:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000200), 0x1, 0x2) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, 0xffffffff, 0x10, 0x0, @ib={0x1b, 0x7fffffff, 0x0, {"e69de71cf2b05fe8dadfd1f1999a0559"}, 0x1000, 0x2, 0x9}}}, 0xa0) 00:47:14 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece030200a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:14 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) [ 2747.588555] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:14 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @rand_addr}}}}}, &(0x7f0000000300)) 00:47:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "00000000000000000000000000000000000000000000000000000000000400", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:14 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)="73656375726974795c6c6f757365725e3a6264657629656d316d696d655f74797065272d2f70726f6310", 0x13e, 0x0) [ 2747.700581] nla_parse: 10 callbacks suppressed [ 2747.700597] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2747.729494] kernel msg: ebtables bug: please report to author: Wrong len argument 00:47:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) 00:47:14 executing program 1: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00', &(0x7f0000000280)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x125, 0x0) 00:47:14 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03b801a31e42cae31b3a00005e00a6549d91c0", 0x22) 00:47:14 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f00000002c0)={0x0, 0x5}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000380)={r2, 0x14}, 0x8) syz_emit_ethernet(0x2a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0180c200fa000101000000010000000000f9bc4f784bbe8694aa7f00000100456d51595129ea00907840c4472eebd44c3ccb7f3765ea7e0934034d65b16ac310d98309895a7203f768bf66956b1bbdb4e66228493a93685083e118f944619bed892ee907c2e74b5c68763fe32e627f8c94162c2ec778d9a82d05e4ce0e63c067532a1bcf24f098c2f581e23428266a63d9af8953bc7267f74bfb5f0c1c5d44fcfff4565e873635bfafa29f4ec522d062eeaabe31a3021038dd419ae5e6fda13c0c3dd79c39bad49e66efdf843f7b7f93ee27a03e13790207c7a7e3d2fe361d"], &(0x7f0000000300)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) waitid(0x3, r3, &(0x7f0000000080), 0x20000004, &(0x7f00000000c0)) setsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f00000001c0)="c79d2da2a0e124b25d18c05e2f196edf85e26c7cd700d420cdd32b28232d830fdd1f285bc8ca2f97cd19a6cc30a2cf32e73373c774527ae22c6d235344121746d455e66c12856a4123a863dd176efe090ee973bf71c29d18cba81e61c142eaaf4d2bb3e247f78fecf3ebbce263f262b7fffc73115b874f5cf38771212e3a73fcd9780c35c1", 0x85) [ 2747.754603] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value 00:47:14 executing program 5: stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) 00:47:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x3, 0x268, [0x0, 0x20000800, 0x20000920, 0x20000b68], 0x0, &(0x7f00000002c0), &(0x7f0000000800)=[{0x0, "000000000000000000000000000000000000000000000000000000000000ff00", 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'team_slave_1\x00', 'bond_slave_0\x00', 'irlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0xa0, 0xa0, 0xf0, [@pkttype={'pkttype\x00', 0x8}]}}, @common=@log={'log\x00', 0x28, {{0x0, "92a7bd7b7d566dfa21653f58506567822be305663cfa3302c3c92b8bd16d"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'erspan0\x00', 'gretap0\x00', 'syzkaller0\x00', 'gretap0\x00', @random="cd8fbebe19a2", [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "5837ed26a52ac82c12477be363b474f9817a704d9310e297a7daff5ffc99a9b4e0a0833cd79146ebede64170ec9ecbe38fa35c41b0448940067aa7fd8bf4ef59"}}}}]}]}, 0x530) 00:47:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') sendfile(r1, r2, &(0x7f0000000340), 0x800009) [ 2747.872935] XFS (loop3): Invalid superblock magic number 00:47:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x400, &(0x7f0000000780)={[{@noquota='noquota', 0x2c}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:47:15 executing program 2: r0 = socket(0x10, 0x83000000003, 0x0) write(r0, &(0x7f0000000000)="220000001e0063fffc01fd03ef6ece03006ca31e42cae31b3a00005e00a6549d91c0", 0x22) [ 2747.920413] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2747.957425] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2747.965956] netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. [ 2748.053760] FAT-fs (loop3): Unrecognized mount option "xfs" or missing value [ 2748.110799] XFS (loop3): Invalid superblock magic number [ 2750.195306] ================================================================== [ 2750.202725] BUG: KASAN: slab-out-of-bounds in find_first_bit+0xf7/0x100 [ 2750.209475] Read of size 8 at addr ffff8801a39992d0 by task kswapd0/1532 [ 2750.209654] ------------[ cut here ]------------ [ 2750.216323] [ 2750.221116] kernel BUG at mm/vmscan.c:593! [ 2750.222729] CPU: 1 PID: 1532 Comm: kswapd0 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2750.227006] invalid opcode: 0000 [#1] SMP KASAN [ 2750.234705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2750.234713] Call Trace: [ 2750.239367] CPU: 0 PID: 3981 Comm: syz-executor4 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 2750.248703] dump_stack+0x1c9/0x2b4 [ 2750.251255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2750.259551] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2750.263157] RIP: 0010:shrink_slab+0xb3e/0xdb0 [ 2750.272483] ? printk+0xa7/0xcf [ 2750.277640] Code: [ 2750.282116] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 2750.285364] 8d [ 2750.287500] ? find_first_bit+0xf7/0x100 [ 2750.292221] a8 [ 2750.294091] print_address_description+0x6c/0x20b [ 2750.298111] fd ff [ 2750.299992] ? find_first_bit+0xf7/0x100 [ 2750.304809] ff [ 2750.306943] kasan_report.cold.7+0x242/0x30d [ 2750.310968] f0 [ 2750.312839] __asan_report_load8_noabort+0x14/0x20 [ 2750.317215] 48 [ 2750.319091] find_first_bit+0xf7/0x100 [ 2750.323994] 0f [ 2750.325868] shrink_slab+0x5d0/0xdb0 [ 2750.329723] b3 [ 2750.331610] ? shrink_node_memcg+0xc91/0x18f0 [ 2750.335289] 08 [ 2750.337163] ? unregister_memcg_shrinker.isra.39+0x50/0x50 [ 2750.341622] e8 [ 2750.343498] ? shrink_active_list+0x1830/0x1830 [ 2750.349089] 3d [ 2750.350964] ? perf_sched_cb_inc+0x2e0/0x2e0 [ 2750.355595] b8 [ 2750.357468] ? lock_downgrade+0x8f0/0x8f0 [ 2750.361837] da [ 2750.363718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2750.367823] ff [ 2750.369695] shrink_node+0x429/0x16a0 [ 2750.375199] 48 [ 2750.377085] ? shrink_node_memcg+0x18f0/0x18f0 [ 2750.380841] 8b [ 2750.382718] ? zone_watermark_ok_safe+0x14b/0x3d0 [ 2750.387265] 85 [ 2750.389137] ? lock_acquire+0x1e4/0x540 [ 2750.393942] c0 [ 2750.395818] ? __alloc_pages_direct_compact+0x340/0x340 [ 2750.399758] fd [ 2750.401668] ? lock_release+0xa30/0xa30 [ 2750.406996] ff [ 2750.408883] ? __sched_text_start+0x8/0x8 [ 2750.412825] ff [ 2750.414699] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2750.418808] c7 [ 2750.420678] ? pgdat_balanced+0x118/0x150 [ 2750.426179] 00 [ 2750.428055] balance_pgdat+0x7ca/0x1010 [ 2750.432167] f8 [ 2750.434055] ? mem_cgroup_shrink_node+0xb20/0xb20 [ 2750.437990] f8 [ 2750.439869] ? check_same_owner+0x340/0x340 [ 2750.444670] f8 [ 2750.446545] ? rcu_note_context_switch+0x730/0x730 [ 2750.450834] f8 [ 2750.452707] kswapd+0x82e/0x12f0 [ 2750.457603] c6 [ 2750.459485] ? balance_pgdat+0x1010/0x1010 [ 2750.462813] 40 [ 2750.464685] ? finish_wait+0x430/0x430 [ 2750.468884] 04 [ 2750.470766] ? kasan_check_read+0x11/0x20 [ 2750.474611] f8 [ 2750.476488] ? do_raw_spin_unlock+0xa7/0x2f0 [ 2750.480604] e9 [ 2750.482479] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 2750.486851] 5d [ 2750.488723] ? __kthread_parkme+0x58/0x1b0 [ 2750.493790] fb [ 2750.495667] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2750.499866] ff [ 2750.501742] ? trace_hardirqs_on+0xd/0x10 [ 2750.506731] ff [ 2750.508604] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2750.512716] e8 [ 2750.514590] ? __kthread_parkme+0x106/0x1b0 [ 2750.520095] 22 [ 2750.521971] kthread+0x345/0x410 [ 2750.526260] b8 [ 2750.528132] ? balance_pgdat+0x1010/0x1010 [ 2750.531459] da ff [ 2750.533337] ? kthread_bind+0x40/0x40 [ 2750.537543] <0f> [ 2750.539674] ret_from_fork+0x3a/0x50 [ 2750.543452] 0b [ 2750.545494] [ 2750.549175] e8 [ 2750.551041] Allocated by task 5048: [ 2750.552640] 1b [ 2750.554516] save_stack+0x43/0xd0 [ 2750.558109] b8 [ 2750.559994] kasan_kmalloc+0xc4/0xe0 [ 2750.563412] da [ 2750.565286] __kmalloc_node+0x47/0x70 [ 2750.568964] ff [ 2750.570839] kvmalloc_node+0x65/0xf0 [ 2750.574604] 48 [ 2750.576475] memcg_expand_shrinker_maps+0x1b1/0x3c0 [ 2750.580156] 8b [ 2750.582035] prealloc_shrinker+0x29e/0x450 [ 2750.587016] 9d [ 2750.588906] alloc_super+0x8dd/0xb10 [ 2750.593105] d8 [ 2750.594976] sget_userns+0x276/0x860 [ 2750.598654] fd [ 2750.600538] sget+0x10b/0x150 [ 2750.604219] ff [ 2750.606092] mount_nodev+0x38/0x120 [ 2750.609162] ff [ 2750.611035] shmem_mount+0x34/0x40 [ 2750.614630] 31 [ 2750.616502] legacy_get_tree+0x118/0x440 [ 2750.620007] ff [ 2750.621882] vfs_get_tree+0x1cb/0x5c0 [ 2750.625911] 48 [ 2750.627785] do_mount+0x6c1/0x1fb0 [ 2750.631550] 89 [ 2750.633424] ksys_mount+0x12d/0x140 [ 2750.636929] de [ 2750.638798] __x64_sys_mount+0xbe/0x150 [ 2750.638814] do_syscall_64+0x1b9/0x820 [ 2750.642409] e8 [ 2750.644280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2750.648220] 3a [ 2750.652080] [ 2750.653943] b9 [ 2750.659108] Freed by task 3668: [ 2750.662582] save_stack+0x43/0xd0 [ 2750.664443] RSP: 0018:ffff88019ec56260 EFLAGS: 00010293 [ 2750.667705] __kasan_slab_free+0x11a/0x170 [ 2750.676464] kasan_slab_free+0xe/0x10 [ 2750.680683] RAX: ffff880198658000 RBX: ffff88019ec564b0 RCX: ffffffff81a1bf32 [ 2750.684460] kfree+0xd9/0x260 [ 2750.691705] RDX: 0000000000000000 RSI: ffffffff81a1c23e RDI: 0000000000000007 [ 2750.694791] single_release+0x8f/0xb0 [ 2750.702032] RBP: ffff88019ec564d8 R08: ffff880198658000 R09: ffffed00399f5e40 [ 2750.705821] close_pdeo.part.2+0x126/0x490 [ 2750.713062] R10: ffffed00399f5e40 R11: ffff8801ccfaf207 R12: dffffc0000000000 [ 2750.717276] close_pdeo+0x168/0x1d0 [ 2750.724521] R13: ffff8801cc3111f0 R14: 0000000000000000 R15: ffff88019ec562f0 [ 2750.728126] proc_reg_release+0x120/0x160 [ 2750.735371] FS: 0000000001022940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 2750.739587] __fput+0x35d/0x930 [ 2750.747780] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2750.747792] CR2: 0000000000863fd0 CR3: 00000001cd549000 CR4: 00000000001406f0 [ 2750.751048] ____fput+0x15/0x20 [ 2750.756914] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2750.764167] task_work_run+0x1ec/0x2a0 [ 2750.767417] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2750.774667] exit_to_usermode_loop+0x313/0x370 [ 2750.778521] Call Trace: [ 2750.785774] do_syscall_64+0x6be/0x820 [ 2750.790354] ? unregister_memcg_shrinker.isra.39+0x50/0x50 [ 2750.792924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2750.796798] ? shrink_active_list+0x1830/0x1830 [ 2750.802385] [ 2750.807558] ? do_raw_spin_unlock+0xa7/0x2f0 [ 2750.812202] The buggy address belongs to the object at ffff8801a39992c0 [ 2750.812202] which belongs to the cache kmalloc-32 of size 32 [ 2750.813809] ? zap_class+0x740/0x740 [ 2750.818195] The buggy address is located 16 bytes inside of [ 2750.818195] 32-byte region [ffff8801a39992c0, ffff8801a39992e0) [ 2750.830653] ? trace_hardirqs_off+0xd/0x10 [ 2750.834339] The buggy address belongs to the page: [ 2750.846031] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 2750.850252] page:ffffea00068e6640 count:1 mapcount:0 mapping:ffff8801da8001c0 index:0xffff8801a3999fc1 [ 2750.855160] ? migrate_swap_stop+0x850/0x850 [ 2750.869654] shrink_node+0x429/0x16a0 [ 2750.874032] flags: 0x2fffc0000000100(slab) [ 2750.877820] ? shrink_node_memcg+0x18f0/0x18f0 [ 2750.882025] raw: 02fffc0000000100 ffffea00065f1d88 ffffea000760c188 ffff8801da8001c0 [ 2750.886585] ? kvm_clock_read+0x25/0x30 [ 2750.894435] raw: ffff8801a3999fc1 ffff8801a3999000 000000010000000a 0000000000000000 [ 2750.898388] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2750.906247] page dumped because: kasan: bad access detected [ 2750.911257] ? ktime_get_raw_ts64+0x4f0/0x4f0 [ 2750.916930] [ 2750.921422] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2750.923026] Memory state around the buggy address: [ 2750.928546] ? __cpuset_node_allowed+0x19b/0x670 [ 2750.933443] ffff8801a3999180: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 2750.938180] ? trace_hardirqs_on+0x10/0x10 [ 2750.945521] ffff8801a3999200: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 2750.949739] ? cpuset_nodemask_valid_mems_allowed+0x90/0x90 [ 2750.957065] >ffff8801a3999280: 00 00 06 fc fc fc fc fc 00 00 06 fc fc fc fc fc [ 2750.962754] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2750.970081] ^ [ 2750.974817] do_try_to_free_pages+0x3e7/0x1290 [ 2750.980759] ffff8801a3999300: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 2750.985325] ? shrink_node+0x16a0/0x16a0 [ 2750.992662] ffff8801a3999380: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 2750.996703] ? __wake_up_common+0x740/0x740 [ 2751.004032] ================================================================== [ 2751.008338] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2751.015728] Kernel panic - not syncing: panic_on_warn set ... [ 2751.015728] [ 2751.021198] ? __cpuset_node_allowed+0x19b/0x670 [ 2751.033275] try_to_free_pages+0x4b2/0xb80 [ 2751.037500] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2751.043021] ? pgdat_balanced+0x118/0x150 [ 2751.047152] ? do_try_to_free_pages+0x1290/0x1290 [ 2751.051985] ? lock_acquire+0x1e4/0x540 [ 2751.055941] ? bad_range+0x160/0x160 [ 2751.059638] ? lock_downgrade+0x8f0/0x8f0 [ 2751.063782] ? lock_release+0xa30/0xa30 [ 2751.067752] ? lock_release+0xa30/0xa30 [ 2751.071708] ? retint_kernel+0x10/0x10 [ 2751.075580] ? check_same_owner+0x340/0x340 [ 2751.079884] ? wake_all_kswapds+0x14d/0x2e0 [ 2751.084196] __alloc_pages_slowpath+0x953/0x2d00 [ 2751.088959] ? warn_alloc+0x120/0x120 [ 2751.092762] ? retint_kernel+0x10/0x10 [ 2751.097072] ? perf_trace_lock+0xde/0x920 [ 2751.101208] ? should_fail+0x2cd/0xd86 [ 2751.105084] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2751.110602] ? should_fail+0x246/0xd86 [ 2751.114482] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2751.119570] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2751.124316] ? trace_hardirqs_on+0x10/0x10 [ 2751.128543] ? lock_acquire+0x1e4/0x540 [ 2751.132517] ? fs_reclaim_acquire+0x20/0x20 [ 2751.136824] ? lock_downgrade+0x8f0/0x8f0 [ 2751.140960] ? check_same_owner+0x340/0x340 [ 2751.145268] ? rcu_note_context_switch+0x730/0x730 [ 2751.150198] __alloc_pages_nodemask+0xa7c/0xdb0 [ 2751.154865] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 2751.159869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2751.165393] ? lock_acquire+0x1e4/0x540 [ 2751.169896] ? xa_load+0x288/0x450 [ 2751.173423] ? lock_downgrade+0x8f0/0x8f0 [ 2751.177556] ? lock_release+0xa30/0xa30 [ 2751.181521] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2751.187043] alloc_pages_current+0x10c/0x210 [ 2751.191440] __page_cache_alloc+0x398/0x5e0 [ 2751.195745] ? xa_load+0x2b1/0x450 [ 2751.199268] ? xa_clear_tag+0x40/0x40 [ 2751.203055] ? filemap_range_has_page+0x4c0/0x4c0 [ 2751.208404] ? __do_page_cache_readahead+0x3b3/0x690 [ 2751.213495] __do_page_cache_readahead+0x24e/0x690 [ 2751.218410] ? zap_class+0x6c1/0x740 [ 2751.222121] ? read_pages+0x680/0x680 [ 2751.225910] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2751.231432] ? __radix_tree_lookup+0x491/0x610 [ 2751.236002] filemap_fault+0xe41/0x2220 [ 2751.239969] ? __lock_page_or_retry+0x620/0x620 [ 2751.244635] ? lock_downgrade+0x8f0/0x8f0 [ 2751.248769] ? lock_release+0xa30/0xa30 [ 2751.252729] ? rcu_read_lock+0x70/0x70 [ 2751.256606] ? balance_dirty_pages_ratelimited+0x1f7/0x2200 [ 2751.262301] ? __set_page_dirty+0x5c0/0x5c0 [ 2751.266621] ? balance_dirty_pages+0x37b0/0x37b0 [ 2751.271362] ? shmem_parse_options.cold.52+0x49/0x49 [ 2751.276456] ? ext4_set_page_dirty+0x254/0x340 [ 2751.281028] ? ext4_readpages+0x120/0x120 [ 2751.285161] ? zap_class+0x740/0x740 [ 2751.288864] ? ext4_readpages+0x120/0x120 [ 2751.292996] ? set_page_dirty+0x36f/0x6f0 [ 2751.297129] ? __writepage+0xe0/0xe0 [ 2751.300830] ? trace_hardirqs_on+0x10/0x10 [ 2751.305047] ? alloc_set_pte+0xaf6/0x1790 [ 2751.309181] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2751.314791] ? unlock_page+0x1d1/0x2c0 [ 2751.318662] ? wake_up_page_bit+0x5b0/0x5b0 [ 2751.322967] ? do_swap_page+0x2280/0x2280 [ 2751.327099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2751.332619] ? page_rmapping+0xd9/0x160 [ 2751.336589] ? vm_mmap+0xc0/0xc0 [ 2751.339943] __do_fault+0xee/0x450 [ 2751.343471] ? perf_trace_lock+0xde/0x920 [ 2751.347601] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 2751.352688] ? fault_dirty_shared_page.isra.96+0x213/0x320 [ 2751.358298] ? pud_val+0x88/0x100 [ 2751.361733] ? pmd_val+0x100/0x100 [ 2751.365261] __handle_mm_fault+0x2ad5/0x4480 [ 2751.369657] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 2751.374484] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 2751.379055] ? lock_acquire+0x1e4/0x540 [ 2751.383036] ? handle_mm_fault+0x417/0xc80 [ 2751.387257] ? lock_downgrade+0x8f0/0x8f0 [ 2751.391388] ? lock_release+0xa30/0xa30 [ 2751.395349] ? lock_release+0xa30/0xa30 [ 2751.399309] ? mem_cgroup_from_task+0xcb/0x1f0 [ 2751.403887] ? mem_cgroup_css_online+0x3c0/0x3c0 [ 2751.408630] handle_mm_fault+0x53e/0xc80 [ 2751.412686] ? __handle_mm_fault+0x4480/0x4480 [ 2751.417252] ? find_vma+0x34/0x190 [ 2751.420777] __do_page_fault+0x620/0xe50 [ 2751.424826] ? mm_fault_error+0x380/0x380 [ 2751.428959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2751.434479] ? __x64_sys_clock_gettime+0x170/0x250 [ 2751.439393] ? __ia32_sys_clock_settime+0x290/0x290 [ 2751.444395] do_page_fault+0xf6/0x8c0 [ 2751.448179] ? vmalloc_sync_all+0x30/0x30 [ 2751.452311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2751.457832] ? do_syscall_64+0x497/0x820 [ 2751.461887] ? syscall_slow_exit_work+0x500/0x500 [ 2751.466713] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2751.471626] ? syscall_return_slowpath+0x31d/0x5e0 [ 2751.476540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2751.482061] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2751.487073] ? page_fault+0x8/0x30 [ 2751.490595] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2751.495425] ? page_fault+0x8/0x30 [ 2751.498950] page_fault+0x1e/0x30 [ 2751.502390] RIP: 0033:0x4075cd [ 2751.505558] Code: 48 83 f8 04 74 37 48 83 f8 08 0f 85 9d 00 00 00 48 8b 44 24 10 48 0b 44 24 18 0f 85 1d 01 00 00 48 8b 44 24 20 48 8b 74 24 28 <48> 89 30 64 f0 83 2c 25 d0 ff ff ff 01 48 83 c4 38 c3 90 48 8b 44 [ 2751.524770] RSP: 002b:00007ffd54e1b700 EFLAGS: 00010246 [ 2751.530119] RAX: 0000000020000200 RBX: 0000000000000000 RCX: 0000000000000000 [ 2751.537370] RDX: 54424baffe00ac71 RSI: 0000000000000000 RDI: 0000000001022848 [ 2751.544621] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730a18 [ 2751.551872] R10: 00007ffd54e1b700 R11: 0000000000000246 R12: 000000000029f050 [ 2751.559122] R13: 0000000000000002 R14: 000000000072bea0 R15: 0000000000000001 [ 2751.566384] Modules linked in: [ 2751.569562] Dumping ftrace buffer: [ 2751.573091] (ftrace buffer empty) [ 2751.577247] Dumping ftrace buffer: [ 2751.580778] --------------------------------- [ 2751.585277] syz-exec-13575 1...2 1605234348us : 0: }D [ 2751.585281] --------------------------------- [ 2751.595080] Kernel Offset: disabled [ 2751.598686] Rebooting in 86400 seconds..