x0) 19:51:16 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffd000/0x3000)=nil, 0x930, 0x300000d, 0x11, r0, 0x0) 19:51:16 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000010c0)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) 19:51:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@utf8}]}) [ 1063.207178] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1063.240916] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410005865e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000500)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'bridge_slave_1\x00', &(0x7f00000002c0)=@ethtool_rxnfc={0x29, 0x0, 0x0, {0x0, @sctp_ip4_spec={@empty, @private}, {0x0, @broadcast}, @esp_ip4_spec={@local, @remote}, {0x0, @link_local}}}}) 19:51:16 executing program 4: syz_mount_image$f2fs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x9, &(0x7f0000000280)) 19:51:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000081e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:16 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) [ 1063.441035] FAT-fs (loop5): bogus number of reserved sectors [ 1063.441047] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1063.453868] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1063.454081] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000500)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x25}]}, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1063.603973] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1063.610355] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1063.674544] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1063.674559] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 1063.677262] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1063.677280] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 1063.677470] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1063.677480] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 1063.677493] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1063.677503] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 19:51:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000002e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x5501, 0x0) 19:51:16 executing program 5: futex(0x0, 0x5, 0x0, &(0x7f0000000140)={0x77359400}, 0x0, 0x0) 19:51:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c07, 0xffffffffffffffff) 19:51:16 executing program 4: timer_create(0x1, &(0x7f0000001200)={0x0, 0x0, 0x1}, &(0x7f0000001240)) clock_gettime(0x0, &(0x7f0000001140)={0x0}) timer_settime(0x0, 0x0, &(0x7f0000001180)={{0x77359400}, {r0}}, &(0x7f0000001300)) 19:51:16 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c", 0xa6, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4004850) 19:51:16 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) write$UHID_CREATE2(r0, 0x0, 0x0) 19:51:16 executing program 3: ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4}, {0x5, 0x0, 0x0, 0x9777}, {}]}) 19:51:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, 0x0) 19:51:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000003e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:16 executing program 1: timer_create(0x0, 0x0, &(0x7f0000001240)) timer_settime(0x0, 0x0, &(0x7f0000001180)={{0x77359400}}, 0x0) 19:51:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg(r0, &(0x7f0000005400)={0x0, 0x0, &(0x7f0000005300)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40010121) 19:51:17 executing program 3: socket(0x11, 0xa, 0x2) 19:51:17 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300), 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000000540)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/188, 0xbc}}, 0x120) 19:51:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000004e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1064.353810] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.353831] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.353848] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.353865] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.353882] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.353899] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.353915] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.353932] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.353948] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.353965] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.353982] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.353998] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354016] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354034] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354050] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354067] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354083] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354099] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354115] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354132] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354148] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354165] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354181] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354197] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354214] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354230] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354246] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354263] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354280] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354297] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354313] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354329] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354346] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354362] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354378] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354394] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354411] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354427] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354443] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354458] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354475] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354492] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354508] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354524] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.354540] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365370] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365391] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365409] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365427] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365445] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365462] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365481] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365498] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365515] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365533] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365550] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365567] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365585] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365603] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365626] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365644] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365661] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365678] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365695] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365712] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365730] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365747] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365765] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365782] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365798] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365849] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365865] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365882] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365898] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365916] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365933] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365950] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365966] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.365983] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366000] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366018] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366034] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366051] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366067] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366084] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366101] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366119] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366143] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366160] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366176] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366192] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366210] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366227] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366243] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366260] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366276] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366293] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366309] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366326] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366343] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366360] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366434] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366451] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366468] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366485] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366503] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366520] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366537] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366554] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366571] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366588] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366611] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366628] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366644] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366661] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366679] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366696] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366713] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366731] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366748] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366764] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366781] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366798] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366815] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366832] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366850] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366867] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366884] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366901] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366918] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366934] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366951] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366968] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.366986] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367002] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367019] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367037] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367053] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367069] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367086] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367104] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367120] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367136] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367153] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367171] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367187] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367204] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367221] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367238] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367255] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367271] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367288] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367304] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367321] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367338] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367355] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367372] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367388] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367405] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367422] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367438] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367455] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367525] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367541] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367558] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367575] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367592] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367613] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367631] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367648] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367664] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367681] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367698] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367714] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367731] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367747] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367764] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367780] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367796] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367813] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367830] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367846] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 19:51:18 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c", 0xa6, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x28}, 0x0) 19:51:18 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x401070c9, 0xffffffffffffffff) 19:51:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:18 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x20c000, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000180), r0) 19:51:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000005e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1064.367863] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367880] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367897] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367913] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367930] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.367946] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1064.370169] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 19:51:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x4643}]}) 19:51:18 executing program 4: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='\x00') 19:51:18 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 19:51:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000006e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0xffffc90000000000, 0x0, &(0x7f0000000040)={0x0, 0x0}) 19:51:18 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') 19:51:19 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f9", 0xb2, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000600)={0x2, &(0x7f0000000580)=[{}, {}]}) 19:51:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000007e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:19 executing program 4: ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000600)={0x6, &(0x7f0000000580)=[{0x6, 0x0, 0x6}, {0x0, 0x0, 0x5}, {0x0, 0x0, 0x0, 0xcf8}, {0x0, 0x40, 0x80}, {0x5287, 0x41}, {0x0, 0x0, 0xb4, 0x2e}]}) 19:51:19 executing program 1: syz_open_dev$vcsn(0x0, 0x0, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) 19:51:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x23, 0x0, 0x0) 19:51:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000008e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x64010100}, 0x10) 19:51:19 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x1265, 0xffffffffffffffff) 19:51:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e010000000000000000003a00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) ioctl$TCSETA(r2, 0x540a, 0x0) 19:51:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "44b5881fe2e4366235542cbda52fe6191bf96bef61bccc4f83ca61d52d0e14cf3eb7dfdedcaaf4489146b4cd55af69f9b41d45879bd42a850a86e758ffcab2"}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="cc1f503713db94849ea22178b5ed39f84c5f6829a2eaa9e0472faf2ed47a360bc79495e3eb5ef581", 0x28}, {&(0x7f00000000c0)="ffc940d4ba7cd203ab13aaec2a", 0xd}, {&(0x7f0000000140)="b8", 0x1}], 0x3, &(0x7f00000001c0)=[{0x28, 0x0, 0x0, "77c679ac31968bb204d077189ccb517717"}], 0x28}, 0x0) 19:51:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xe6, &(0x7f00000000c0)=""/230, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:19 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f9", 0xb2, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef41000000ae3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:19 executing program 4: syz_mount_image$msdos(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)) 19:51:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001500), 0x0, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, 0x0) 19:51:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0xf0f7e2) ioctl$LOOP_GET_STATUS(r0, 0x4c03, 0x0) 19:51:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x9, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef41000000ce3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:19 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x0, 0x0) write$P9_RGETATTR(r0, 0x0, 0x0) 19:51:19 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) 19:51:19 executing program 5: select(0x0, 0x0, 0x0, &(0x7f0000001180), &(0x7f00000011c0)) [ 1067.013303] FAT-fs (loop4): bogus number of reserved sectors 19:51:19 executing program 4: openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:51:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef41000000ee3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1067.039915] FAT-fs (loop4): Can't find a valid FAT filesystem 19:51:20 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2b, 0x59}) 19:51:20 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x0, 0x0) getsockname$tipc(r0, 0x0, 0x0) 19:51:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x3, &(0x7f0000000500)=@framed={{0x18, 0xa}}, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000010e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:20 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f9", 0xb2, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:20 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001dc0), 0x0, 0x0) 19:51:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000019c0)='-', 0x1, 0xc0, 0x0, 0x0) 19:51:20 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8933, 0x0) 19:51:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000018e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@fat=@dos1xfloppy}]}) 19:51:20 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) inotify_rm_watch(r0, 0x0) 19:51:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x80087601, 0xffffffffffffffff) [ 1067.735205] validate_nla: 22 callbacks suppressed [ 1067.735215] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1067.735469] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1067.812798] FAT-fs (loop5): bogus number of reserved sectors [ 1067.812811] FAT-fs (loop5): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 1067.812818] FAT-fs (loop5): Can't find a valid FAT filesystem 19:51:20 executing program 4: syz_open_dev$rtc(&(0x7f00000005c0), 0x0, 0x200001) 19:51:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000060e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:20 executing program 5: timer_create(0x5fa335511f058407, 0x0, 0x0) 19:51:20 executing program 3: pselect6(0x40, &(0x7f0000000240), &(0x7f0000000080)={0x4}, 0x0, 0x0, 0x0) [ 1068.074851] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1068.079238] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:21 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628", 0xb8, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:21 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4b49, 0xffffffffffffffff) 19:51:21 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40), &(0x7f0000000f80)="762060bba6", 0x5, 0x0) setxattr$incfs_metadata(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000), &(0x7f0000001040)="2482f66e7657", 0x6, 0x0) 19:51:21 executing program 4: openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:51:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd25fb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:21 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0x11, 0x0, 0x0, 0x0}, 0x20) 19:51:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x5452, 0xffffffffffffffff) 19:51:21 executing program 4: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x80c100) 19:51:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 19:51:21 executing program 3: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000500)) [ 1068.411321] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1068.426003] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1068.450176] bond0: Releasing backup interface team0 19:51:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efbc00e09000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:21 executing program 4: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) getgroups(0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000005c40)='./binderfs/binder-control\x00', 0x0, 0x0) [ 1068.524546] device team0 left promiscuous mode [ 1068.524558] device team_slave_0 left promiscuous mode [ 1068.525564] bridge0: port 12(team0) entered blocking state [ 1068.527443] bridge0: port 12(team0) entered disabled state [ 1068.534790] device team0 entered promiscuous mode [ 1068.534800] device team_slave_0 entered promiscuous mode [ 1068.683449] audit: type=1326 audit(1649101881.516:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19236 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f51671ed049 code=0x0 [ 1068.687683] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1068.687825] device team0 left promiscuous mode [ 1068.687833] device team_slave_0 left promiscuous mode [ 1068.688091] bridge0: port 12(team0) entered disabled state [ 1068.706472] 8021q: adding VLAN 0 to HW filter on device team0 [ 1068.707338] device team0 entered promiscuous mode [ 1068.707347] device team_slave_0 entered promiscuous mode [ 1068.708013] bond0: Enslaving team0 as an active interface with an up link [ 1068.716667] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1068.719558] bond0: Releasing backup interface team0 [ 1068.720357] device team0 left promiscuous mode [ 1068.720367] device team_slave_0 left promiscuous mode [ 1068.963482] bridge0: port 12(team0) entered blocking state [ 1068.963568] bridge0: port 12(team0) entered disabled state [ 1068.969802] device team0 entered promiscuous mode [ 1068.969812] device team_slave_0 entered promiscuous mode 19:51:21 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628", 0xb8, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000880)=[{{0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}], 0x3}}], 0x1, 0x4004850) 19:51:21 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000001d00)='./file0\x00', 0x80a) 19:51:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0xc0, 0x0, 0x0) 19:51:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xa, 0x5, 0x401, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 19:51:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb002009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000007d7ab5"], 0x1c}}, 0x0) 19:51:22 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200), 0x175d900f) writev(r0, 0x0, 0x0) 19:51:22 executing program 4: syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={[{@fat=@gid}]}) 19:51:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) read$FUSE(r1, 0x0, 0x0) writev(r1, 0x0, 0x0) [ 1069.244618] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1069.244767] device team0 left promiscuous mode [ 1069.244775] device team_slave_0 left promiscuous mode [ 1069.245037] bridge0: port 12(team0) entered disabled state [ 1069.251808] 8021q: adding VLAN 0 to HW filter on device team0 [ 1069.278140] device team0 entered promiscuous mode [ 1069.278152] device team_slave_0 entered promiscuous mode 19:51:22 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) ioctl$UI_SET_PHYS(r0, 0x4004556a, 0x0) [ 1069.278860] bond0: Enslaving team0 as an active interface with an up link [ 1069.282016] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1069.286235] bond0: Releasing backup interface team0 19:51:22 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x240, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000180)={0x0, {'syz1\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}}, 0x120) syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x880) [ 1069.287636] device team0 left promiscuous mode [ 1069.287645] device team_slave_0 left promiscuous mode [ 1069.485376] FAT-fs (loop4): bogus number of reserved sectors [ 1069.485388] FAT-fs (loop4): Can't find a valid FAT filesystem 19:51:22 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628", 0xb8, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x40004044) 19:51:22 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) [ 1070.042813] bridge0: port 12(team0) entered blocking state [ 1070.070172] bridge0: port 12(team0) entered disabled state [ 1070.083448] device team0 entered promiscuous mode [ 1070.099441] device team_slave_0 entered promiscuous mode 19:51:22 executing program 4: ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) 19:51:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440003000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x5452, 0x0) 19:51:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x25, 0x0, 0x0) 19:51:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)="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"}) 19:51:23 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000002740)=[{{&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x80, 0x0, 0x0, &(0x7f0000001400)=[{0x10}], 0x10}}], 0x1, 0x0) 19:51:23 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000001600), 0x0, 0x0) 19:51:23 executing program 4: r0 = socket(0x11, 0xa, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 19:51:23 executing program 4: syz_mount_image$fuse(&(0x7f0000003800), &(0x7f0000003840)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000003880)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/usb/hiddev#\x00'}}, {@uid_gt}]}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) [ 1070.354894] device team0 left promiscuous mode [ 1070.354904] device team_slave_0 left promiscuous mode [ 1070.355159] bridge0: port 12(team0) entered disabled state [ 1070.368524] 8021q: adding VLAN 0 to HW filter on device team0 [ 1070.376812] device team0 entered promiscuous mode [ 1070.376823] device team_slave_0 entered promiscuous mode [ 1070.382330] bond0: Enslaving team0 as an active interface with an up link [ 1070.393102] bond0: Releasing backup interface team0 [ 1070.396649] device team0 left promiscuous mode [ 1070.396660] device team_slave_0 left promiscuous mode 19:51:23 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088", 0xbb, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:23 executing program 5: syz_clone(0xb9a25cfcafe38673, 0x0, 0x0, 0x0, 0x0, 0x0) 19:51:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x19, &(0x7f00000012c0)='3', 0x1) 19:51:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x17, &(0x7f00000012c0)='3', 0x1) 19:51:23 executing program 1: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300), 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000000540)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/188, 0xbc}}, 0x120) 19:51:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440005000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:23 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f000000ce80)={0x0, 0x0, &(0x7f000000ce40)={&(0x7f0000000340)=ANY=[], 0x14}}, 0x0) [ 1070.906233] bridge0: port 12(team0) entered blocking state [ 1070.906320] bridge0: port 12(team0) entered disabled state [ 1070.907471] device team0 entered promiscuous mode [ 1070.907480] device team_slave_0 entered promiscuous mode 19:51:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x1fffc0000000000, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 19:51:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) write$FUSE_DIRENT(r0, 0x0, 0x0) [ 1070.999605] device team0 left promiscuous mode [ 1071.011908] device team_slave_0 left promiscuous mode [ 1071.030754] bridge0: port 12(team0) entered disabled state [ 1071.041756] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 19:51:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x32, 0x0, 0x0) 19:51:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3599b3b65b77b2275b25d7e9fed47bed8bb000950da382b08f2f1f2863bc9c7dbb4b73988e561ff5fef703f6a65abc584231a9d86128498346bce557747801f4", "ec7dc9d76d71578b4fa73114e42d963fb81f4aef747ec02f71aae909074eb81a20477cea4239f0ce96564e0af541c8c7d238968597ecfc67a7c532e93df54067", "d810cec84b990f889be354ae034a008f011830a3a86b863bbf608558cab364d3"}) [ 1071.093368] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.114138] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.123271] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.131903] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 19:51:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x80, 0x37, 0x9, 0x7}, {0x6, 0x2}]}) [ 1071.223333] audit: type=1326 audit(1649101884.057:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19360 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1a966f0049 code=0x0 [ 1071.223667] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.223686] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.223704] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224179] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224197] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224214] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224230] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224247] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224265] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224282] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224298] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224317] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224335] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224352] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224369] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224388] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224403] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224420] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224435] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224453] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224470] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224487] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224507] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224523] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224539] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224556] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224572] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224588] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224606] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224622] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224639] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224655] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.224672] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227042] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227060] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227084] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227101] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227117] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227134] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227152] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227169] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227185] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227202] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227219] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227236] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227253] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227288] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227305] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227321] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227338] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227355] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227372] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227390] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227407] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227424] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227441] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227458] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227475] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227492] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227509] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227526] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227544] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227561] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227578] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227595] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227612] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227630] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227646] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227663] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227680] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227696] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227712] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227729] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227747] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227763] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227786] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227802] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227819] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227835] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227852] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227869] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227886] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227903] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227919] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227936] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227953] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227970] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.227987] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.228004] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.228021] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.228038] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.228055] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232654] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232673] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232690] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232708] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232725] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232743] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232760] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232778] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232795] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232812] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232829] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232845] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232863] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232880] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232897] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232915] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232932] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232949] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232966] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.232983] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233001] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233018] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233035] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233052] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233069] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233093] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233111] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233127] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233144] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233161] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233178] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233195] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233212] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233229] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233247] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233264] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233281] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233297] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233314] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233331] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233348] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233365] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233382] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233398] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233415] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233432] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233449] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233466] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233482] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233499] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233516] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233533] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233550] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233566] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233582] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233599] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233617] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233633] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233650] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.233667] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.240865] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.240884] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.240902] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.240920] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.240936] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.240953] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.240971] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.240988] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241005] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241022] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241040] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241057] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241075] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241098] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241116] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241133] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241150] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241167] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241184] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241201] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241218] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241235] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241252] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241269] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241286] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241302] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241319] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241336] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241353] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.241370] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1071.250661] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1071.262380] 8021q: adding VLAN 0 to HW filter on device team0 [ 1071.263365] device team0 entered promiscuous mode [ 1071.263374] device team_slave_0 entered promiscuous mode [ 1071.265561] bond0: Enslaving team0 as an active interface with an up link [ 1071.266470] bond0: Releasing backup interface team0 [ 1071.266876] device team0 left promiscuous mode [ 1071.266885] device team_slave_0 left promiscuous mode 19:51:25 executing program 3: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200), 0x175d900f) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) 19:51:25 executing program 5: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000000500)="48b1bf7fef315fd201e292c5c539f4a16621ea2ee6f562c961215fb5c7326eabd5b36fe5faf7fc67085300d87547dc528006c5c8a91c27253cb1e14dd0c37df6d8c410211ae54bbb02bebbda62c60ca80778fcdaf5b178992bfa67dd1b72e3ce84e7b95155ba573d7696943d38ed328ade5d94ea95830dc63889fe3520e2f99f58e604a273355a1251242532bea6677214d6dbc9aab1039511971772ada09836f28acf34b8a6d6bc99f7e7b2521c333bf0cb89edfb497226907e7947fd7704eddaf62e881c3f7d546d7e8f520529226e30b6a95f14ab40378881fe4c326f2a7dc92f32453f38578436164def3b854e4800b39d81d7b4563d93a9ba37a948d7f5d6bf254737774a964718706fe066454b3f0c7b2e97c8e08ce05a60c6f3d0a3f6f48f61fadb67145de300862194fd3c3802dda5610a5b0162bc5bedcf9fb89935ffea0bf7b8fe033e30b201e56a7c4eef1dd1e64a1502b52f567398f33fe624a45ab7e5ea924502c945bcb22d2df491869f6a73fb5d1e41736b60ca94d21ebf6291d92786ddfd7718c135ff6747a8ecede6b97000099f0490174b5538ea952e44d8f3a1c3cab296b791ccb102f2dd837466f2880af5604d835868d9582b852ff558c0bb18f0406fc8cb1f7a5c7bb26a14c3297b2869d09610e90dbc93689739f720ac66ddc8b7f61ff62b3d00a7e0d8306f0020ce8701be2858d7a9d59ae075e28b737aa8ff8df33277fb904e2d1b4dc56cc4cbdf814d604a3c7dc7a6abb494329a63d0189333fa425d42292e256630b3528c56bd83fc70d7dd99041cca72ba53eb6b38f3ff1f41662071040ba591e5ffcb93f4314ae887309f8a5c521b60f796a1dc51d57c74d4b711e8385d2c34888bc644e6cce0f40f63eaa57179609ba0673a0f4f6ef35a8649c66c3840dcaf713f6956a1d0a20522b4caa282cf2ac59fc5b2f6da8be5555a074ed325b7fef73e35bcd5ce9774424cc2b1f8a9cd75d6ab075b2044dec54c9dc419eca512455d100d52edaa509bfe06a852ca549a3f7451c3fac8ccee5dc3e2e7340f407a3acf0a4ecdfb75118ecc4c08b70e9deaa03f16cbbb3e35d8755ebe57203f89fbf1cd1b66ae146175f272b383b1f1428ec6320827bb9a4ce71efea2cdc8cbcfcccfcd22c5e944c3e5c4d46b82c35c8f5b9e50e3fae385d196f6da81a7ee2a8940a218babb0689ec10a7565dd510daa9ad547c86bcbff0da2ba9957fce490ff93cb860ac37a31c0be89d5d01b51171ae2b2dd02a7c1a273ec134f451f36371c606779cd4a344e07059c9f4bc43a5b43cd8f875e5702a744e59cfa6435367cb88ed4b78b4bc979841ef8e9a84b07ae6c6659d229c98eda2c060dd760b927e6426d6c2065d4a71ce1ca2fd06c00924e480783104c0a2e77a73884d1317c8dd51319b432c62377c6bc9d58e6154fa3389472b106914e3416fbe40c32583ded4681190c823b37dbe44482a38c3e116c0fa97b58020c27426692d52b6613b7fa22b4ebe413047cc5137c3b6b8b50e8cdb845f386309c4437150218c9cbaf462ae005c363b778052fb03545998b503d97e97ff232017fb452f8031eb9d9a89d5d0a129d7c8a142f2808bd05b7909dfbb4b10b6a4f14d92469a73359f1c979f5ef73aa0d4925e837d0870e5c2bea5cc2e8d688e917831f0c00e7dd370790b5addb4a9c0e169de75b0031ea6984256d6e3ddc31ea34e430f5699e86ebd6463519599b244f39925ae63dcd36fa055ecdaf637efde8672626d9859c13c0ffc835087755d245d27a24429f8884a168e70c8e16b60215c61e3f1142e56f7ae2ae969a3cd584045224e9ed0b80f06338210e735d77d368667742a0f9e02220e77d687fb03660ddd12912e1561d1b9c851bd098d4af6c68e3293f441951d25207a9a9d429b1bff9a086e58923fe761af58e9c3ab704cebfc7552423c9130dbcab7560d23190892f1f13c7eaa5a90f6235e511e3ac6132fef0ad1c8fe8dcd72ef5a1cd7a7871bdc867114127b8a5e58f973881a62ba87963e2476586602da07dc9d404cba5916a830a933ecf649fb8d7ac7d6e06bb85e57145ef09a35a1de4a4f2ec1251ff3d700d704fa7ab373a5d10b1a6518630748de72c3c3a2c88b1b95a395a6df3d67fef555234606b278ca1b0604b8c6f63bb2361dd20c136e9e47e21abcd2c32fadf34d6cd515a088ad6f468549ae9ae38a93bedd68bfe78c737970e3aa8ea26599fd54f88cc4be9cddbba41f1537dfacdf84de3ee2d333158fd45a07db6885e7de7c920aba95cb70ad5ef2b482ce95d0cbe2460f031c519901fd2724d4dcc8971481dcb32029d00080d95b148d986dce1eb1bd1312b4b0a41387e2ac8599d1c06614d2711f519e1a3550832ba568a8b32be7544090365784cbaceaf5b467eac96317bdd1b5a5c9536957339f92a01acb515939c948a5781b777be72b1550abb10ce13520b5a0e21bc0723ac4590d7d7130a97cf12596411526a844eda3b9c4109da71c71d14741aa3971dd544861d56ca5f58f6e871307142f4b3a94125e967ba0fb94a0fb48bc178d44e0247193b5a0f3cb979bb0e56c39711b2caae89b443396ce8757031623c360e219c5d08484d9557784c65bfa5c185d1acba0a265bf550903e105e126fc2c9edaeae877a349f047ffd8f3edaca9f9c7a40d1d9deb7262290c28695ea2ed0aa90831a934bc119f154a0743274a386f02a2e7d3ea159470342b8ed0a441c91176cd4f336a8e261cb72da30504149233375a70fdc642ab43ce2b815caee8c8976b2c5b43df77135a154f133324f7e15a844521eaf59fc433d3e44a2a06c64fd3ac6e9f457d338b72c53cd13ff17e9f6fe8336194e030b5048c0c30ee063712cc737fa2b776be1c7f9734e540e72aad4485404e7b94951c2e824e2638a1740a5010bcc6016af3ca4ed9f70ff290957d5df5d7930ee696b2a978f3a39b962b98dfdf4226471000fe4c7b74404a1ba5deaedff586af6bafc1ecd84bcda80d61acd4e37821cf59695cfa073f21b412f4959b7380f5a7ba3ad3f6e4946cae098d3556680d2956cb37cefcf5e7ea9029452e608319ebdb38d722ab9d6a439408e6e7162ba7c2fc0bc9c173f4126970a3d85659e6d0d42b9cf075059849375d9acf8440922a0ff3cc5b137726143a85790082ca9593513020a70f27dcf203345df4f86133e05aaf83626de2e591f75cdeb66a635a8f1b24df4ef4f18698adf1909098d4c06c5e07fd88e3e1ece04dc0245dbcdd785e75571f6087809654059be5b07d179bb9dfe01bae606e88bc186ede1a9081ccf7e7db5216a5d6300f17c49372b03ecf2f9bec1c6307e353f4e5c832d740bf882330ca01d4109cf398e511925c501820bd4acf10411c67e167b954bb1476db201e0c332eefe5fcf69bdf1cfcce0b22df53a5663a70dbc6c27c301d9375c7a67195b812f1106a65cb7c3feda64c088e439ddebb5fbcb1772322309e8f65ff4431f7476562ca1fcb77d5184b97a005f534d0b94ccee5e1bd05713d250944c84be49f47acde3fbd3d834e7e9827660a2bd2c63d86ed32472572e3352a7f9664fa031bb344c417d3a20d73619c9da8c8e130aac285b3056aab1f299db20523c4cf2f306a244aa8ccb20c6e3dfba8edf5270ad4a254ce32bb9ccfaa882a93c70a025dbda4d57fdfe23452d2e61e342eed3cf06b3c640fdd886b13014e094333e2997131c47c1dd16894ef83e2eb0044a4b43e2bdba6881e53a8d0d9d8cd3b40a1d5586e38de642d709fb608a05bc8c5658698e71f7727f83ebef3068e70b17a2c01fa73628bfced1954ba6517c6482c55a6e998ddc913ef5ce6d90cc75a9385fbe884c94c4a6b21a989c3f0ca3eff3b39e2bd53c6a1cebfc5260b98892a402c3b78752a787387a2dbc551722046b23f9a31590ef613e3ad3bb3246ddea7dd56c78e44bea2755d0fdde48fb5783e1166ad8fa2c518be0e868bc7b477e40474f402aeb1", 0xb01}], 0x0, 0x0) 19:51:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{}, {0x5}]}) 19:51:25 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 19:51:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440006000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:25 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088", 0xbb, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1071.547738] bridge0: port 12(team0) entered blocking state [ 1071.547824] bridge0: port 12(team0) entered disabled state [ 1071.550359] device team0 entered promiscuous mode [ 1071.550369] device team_slave_0 entered promiscuous mode 19:51:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @local}, 0x10) 19:51:25 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x4, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x40}]}) geteuid() [ 1072.880092] validate_nla: 4 callbacks suppressed [ 1072.880103] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:25 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) ioctl$UI_SET_PHYS(r0, 0x40045567, 0x0) [ 1072.925849] device team0 left promiscuous mode [ 1072.969960] device team_slave_0 left promiscuous mode 19:51:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000015c0)={&(0x7f0000000100)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001580)=[@rights={{0x10}}], 0x10}, 0x0) [ 1072.987968] bridge0: port 12(team0) entered disabled state [ 1072.995153] 8021q: adding VLAN 0 to HW filter on device team0 [ 1072.997842] device team0 entered promiscuous mode [ 1072.997851] device team_slave_0 entered promiscuous mode [ 1072.998576] bond0: Enslaving team0 as an active interface with an up link 19:51:26 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x22441, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000040)={0x7}, 0x7) [ 1072.998616] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1072.999624] bond0: Releasing backup interface team0 [ 1072.999994] device team0 left promiscuous mode [ 1073.000004] device team_slave_0 left promiscuous mode [ 1073.033056] audit: type=1326 audit(1649101885.857:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19392 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1a966f0049 code=0x0 19:51:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f0000001540)) [ 1073.493144] FAT-fs (loop5): bogus number of reserved sectors [ 1073.493155] FAT-fs (loop5): Can't find a valid FAT filesystem 19:51:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x1b, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:26 executing program 5: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) io_setup(0x0, &(0x7f0000000000)) 19:51:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440007000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:26 executing program 5: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) select(0x40, &(0x7f0000001100)={0x9}, 0x0, 0x0, 0x0) [ 1073.726577] bridge0: port 12(team0) entered blocking state [ 1073.726613] bridge0: port 12(team0) entered disabled state [ 1073.727683] device team0 entered promiscuous mode [ 1073.727693] device team_slave_0 entered promiscuous mode [ 1073.789258] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1073.789411] device team0 left promiscuous mode [ 1073.789420] device team_slave_0 left promiscuous mode [ 1073.789687] bridge0: port 12(team0) entered disabled state [ 1073.802211] 8021q: adding VLAN 0 to HW filter on device team0 [ 1073.803342] device team0 entered promiscuous mode [ 1073.803352] device team_slave_0 entered promiscuous mode [ 1073.806088] bond0: Enslaving team0 as an active interface with an up link 19:51:26 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088", 0xbb, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x32, 0x0, &(0x7f0000000240)) 19:51:26 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, 0x0, 0x0) 19:51:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000100), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='nodots,gid=', @ANYRESHEX=0x0, @ANYRESHEX]) 19:51:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@cred={{0x1c}}, @rights={{0x10}}], 0x30}}], 0x1, 0x0) [ 1073.808219] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1073.846545] bond0: Releasing backup interface team0 [ 1073.847827] device team0 left promiscuous mode [ 1073.847837] device team_slave_0 left promiscuous mode 19:51:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x28, 0x0, 0x0) 19:51:26 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x127a, 0x0) 19:51:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x80002) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x1277, 0x0) [ 1073.991576] FAT-fs (loop4): Unrecognized mount option "gid=0x00000000000000000xffffffffffffffff" or missing value 19:51:26 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 19:51:27 executing program 4: syz_open_dev$rtc(&(0x7f00000005c0), 0x0, 0x0) 19:51:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440209000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:27 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000002740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=[{0x10}], 0x10}}], 0x1, 0x0) [ 1074.358274] bridge0: port 12(team0) entered blocking state [ 1074.358357] bridge0: port 12(team0) entered disabled state [ 1074.371248] device team0 entered promiscuous mode [ 1074.371259] device team_slave_0 entered promiscuous mode [ 1074.461215] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1074.471078] device team0 left promiscuous mode [ 1074.471087] device team_slave_0 left promiscuous mode [ 1074.471360] bridge0: port 12(team0) entered disabled state [ 1074.483932] 8021q: adding VLAN 0 to HW filter on device team0 [ 1074.486004] device team0 entered promiscuous mode [ 1074.507553] device team_slave_0 entered promiscuous mode [ 1074.508227] bond0: Enslaving team0 as an active interface with an up link [ 1074.524130] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1074.525498] bond0: Releasing backup interface team0 [ 1074.539737] device team0 left promiscuous mode [ 1074.539747] device team_slave_0 left promiscuous mode [ 1074.677452] bridge0: port 12(team0) entered blocking state [ 1074.677528] bridge0: port 12(team0) entered disabled state [ 1074.690978] device team0 entered promiscuous mode [ 1074.690986] device team_slave_0 entered promiscuous mode 19:51:27 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fb", 0xbc, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:27 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 19:51:27 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f00000008c0), 0x195440, 0x0) 19:51:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{0x5}, {}]}) 19:51:27 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$usbfs(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 19:51:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) 19:51:27 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x1191004, &(0x7f00000002c0)) 19:51:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0xc011) 19:51:27 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000001840)={[{@fat=@dmask}]}) 19:51:27 executing program 4: creat(&(0x7f0000003640)='./file0\x00', 0x0) stat(&(0x7f0000003780)='./file0\x00', &(0x7f0000006280)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000003680), &(0x7f00000036c0)='./file0\x00', 0x0, 0x0, &(0x7f00000061c0), 0x0, &(0x7f0000006300)={[], [{@uid_eq={'uid', 0x3d, r0}}]}) 19:51:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x3cc, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, 0x48) [ 1074.935704] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1074.935854] device team0 left promiscuous mode [ 1074.935862] device team_slave_0 left promiscuous mode [ 1074.936129] bridge0: port 12(team0) entered disabled state [ 1074.942419] 8021q: adding VLAN 0 to HW filter on device team0 [ 1075.002759] device team0 entered promiscuous mode [ 1075.002771] device team_slave_0 entered promiscuous mode [ 1075.003755] bond0: Enslaving team0 as an active interface with an up link [ 1075.006438] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1075.008643] bond0: Releasing backup interface team0 [ 1075.149731] FAT-fs (loop4): Unrecognized mount option "uid=00000000000000032768" or missing value [ 1075.448653] bridge0: port 12(team0) entered blocking state [ 1075.448738] bridge0: port 12(team0) entered disabled state 19:51:28 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fb", 0xbc, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x40000021) 19:51:28 executing program 1: syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) 19:51:28 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000440)={&(0x7f0000000380), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) 19:51:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x28}]}) 19:51:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440409000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000500)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "44b5881fe2e4366235542cbda52fe6191bf96bef61bccc4f83ca61d52d0e14cf3eb7dfdedcaaf4489146b4cd55af69f9b41d45879bd42a850a86e758ffcab2"}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="cc1f503713db94849ea22178b5ed", 0xe}], 0x1}, 0x0) 19:51:28 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0xc00c55ca, &(0x7f0000001380)='syz1\x00') 19:51:28 executing program 4: syz_mount_image$fuse(&(0x7f0000002200), &(0x7f0000002240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002280)) [ 1075.626464] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1075.639834] device team0 left promiscuous mode [ 1075.663153] device team_slave_0 left promiscuous mode 19:51:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x10, 0x0, 0x0) 19:51:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x4, 0x0, 0x0) [ 1075.719014] bridge0: port 12(team0) entered disabled state [ 1075.731993] 8021q: adding VLAN 0 to HW filter on device team0 [ 1075.744293] device team0 entered promiscuous mode [ 1075.744304] device team_slave_0 entered promiscuous mode [ 1075.744973] bond0: Enslaving team0 as an active interface with an up link [ 1075.745015] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1075.746001] bond0: Releasing backup interface team0 [ 1075.759588] device team0 left promiscuous mode [ 1075.759600] device team_slave_0 left promiscuous mode [ 1076.057018] bridge0: port 12(team0) entered blocking state [ 1076.057071] bridge0: port 12(team0) entered disabled state [ 1076.058260] device team0 entered promiscuous mode [ 1076.058269] device team_slave_0 entered promiscuous mode 19:51:29 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fb", 0xbc, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:29 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(r0, 0x0, 0x0) 19:51:29 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x4643}]}) 19:51:29 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x10f402, 0x0) 19:51:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x1, &(0x7f0000000cc0)=[{0x0}], 0x0, 0x0) 19:51:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440509000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6042, 0x0) 19:51:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x31, 0x0, 0x0) 19:51:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x0, 0x0, 0x0, &(0x7f0000000bc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:29 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0xc2881) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) [ 1076.299176] device team0 left promiscuous mode [ 1076.313677] device team_slave_0 left promiscuous mode [ 1076.319228] bridge0: port 12(team0) entered disabled state 19:51:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) [ 1076.354608] 8021q: adding VLAN 0 to HW filter on device team0 [ 1076.377356] device team0 entered promiscuous mode [ 1076.395773] device team_slave_0 entered promiscuous mode 19:51:29 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000780)='ns/ipc\x00') [ 1076.402506] audit: type=1800 audit(1649101889.237:156): pid=19564 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=14738 res=0 [ 1076.422905] bond0: Enslaving team0 as an active interface with an up link [ 1076.440520] bond0: Releasing backup interface team0 [ 1076.769389] bridge0: port 12(team0) entered blocking state [ 1076.769475] bridge0: port 12(team0) entered disabled state 19:51:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) 19:51:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x31, &(0x7f00000012c0)='3', 0x1) 19:51:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000ec0)}, 0x80) 19:51:29 executing program 4: syz_open_dev$vcsn(&(0x7f0000001580), 0x0, 0x0) 19:51:29 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440609000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:29 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000001640), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) 19:51:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x12, &(0x7f00000012c0)='3', 0x1) 19:51:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x31, &(0x7f00000012c0)='3', 0x1) 19:51:29 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x35, 0x0, 0x0, 0x0}, 0x20) 19:51:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x31, &(0x7f00000012c0)='3', 0x1) [ 1076.983544] device team0 left promiscuous mode [ 1076.990419] device team_slave_0 left promiscuous mode [ 1077.019045] bridge0: port 12(team0) entered disabled state 19:51:29 executing program 1: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f00000006c0)='ext3\x00', &(0x7f0000000700)='./file0\x00', 0x3, 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000740)="f4", 0x1}, {&(0x7f0000000840)="e4", 0x1, 0x4}], 0x4000e, &(0x7f0000000d80)={[{@barrier}], [{@smackfsdef={'smackfsdef', 0x3d, 'trusted.overlay.upper\x00'}}]}) syz_mount_image$fuse(&(0x7f0000002200), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1077.069495] 8021q: adding VLAN 0 to HW filter on device team0 19:51:30 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x1262, 0xffffffffffffffff) 19:51:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x2}, {}]}) 19:51:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x31, &(0x7f00000012c0)='3', 0x1) 19:51:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x32, &(0x7f00000012c0)="333beea2", 0x4) [ 1077.090166] device team0 entered promiscuous mode [ 1077.090177] device team_slave_0 entered promiscuous mode [ 1077.090876] bond0: Enslaving team0 as an active interface with an up link [ 1077.091947] bond0: Releasing backup interface team0 [ 1077.092338] device team0 left promiscuous mode [ 1077.092347] device team_slave_0 left promiscuous mode [ 1077.528743] bridge0: port 12(team0) entered blocking state [ 1077.528828] bridge0: port 12(team0) entered disabled state [ 1077.529870] device team0 entered promiscuous mode [ 1077.546030] device team_slave_0 entered promiscuous mode 19:51:30 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:30 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 19:51:30 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000500)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2d}]}, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:30 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0xc020660b, 0x0) 19:51:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x5, &(0x7f0000000500)=@framed={{}, [@call, @jmp]}, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x94, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440709000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x5, &(0x7f0000000500)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x76}, @jmp]}, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:30 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r0) 19:51:30 executing program 5: ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)) 19:51:30 executing program 1: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, @thr={&(0x7f00000000c0), 0x0}}, 0x0) 19:51:30 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000b00)={&(0x7f0000000100)=@qipcrtr, 0x80, &(0x7f0000000980)=[{&(0x7f0000000180)=""/34, 0x22}, {&(0x7f00000001c0)=""/238, 0xee}, {&(0x7f0000000c00)=""/150, 0x96}, {&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000480)=""/236, 0xffffffffffffffbc}, {&(0x7f0000000580)=""/70, 0x46}, {&(0x7f0000000600)=""/212, 0xd4}, {&(0x7f0000000700)=""/223, 0xdf}, {&(0x7f0000000cc0)=""/216, 0xd8}, {&(0x7f0000000900)=""/125, 0x7d}], 0x294cf1ec167985ee, &(0x7f0000000a40)=""/131, 0x83}, 0x0) 19:51:30 executing program 3: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 1077.863367] device team0 left promiscuous mode [ 1077.863377] device team_slave_0 left promiscuous mode [ 1077.863655] bridge0: port 12(team0) entered disabled state [ 1077.880444] 8021q: adding VLAN 0 to HW filter on device team0 [ 1077.881359] device team0 entered promiscuous mode [ 1077.881369] device team_slave_0 entered promiscuous mode [ 1077.882012] bond0: Enslaving team0 as an active interface with an up link [ 1077.893801] validate_nla: 5 callbacks suppressed [ 1077.893810] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1077.896306] bond0: Releasing backup interface team0 [ 1078.259908] bridge0: port 12(team0) entered blocking state [ 1078.260011] bridge0: port 12(team0) entered disabled state 19:51:31 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14}, 0x14}}, 0x0) 19:51:31 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e010000000000000000003a00"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000100)) 19:51:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x25}]}) 19:51:31 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) 19:51:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440809000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:31 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{}, {0x2, 0x0, 0x0, 0xff}]}) 19:51:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x80041284, 0xffffffffffffffff) 19:51:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1a, 0x6, 0x0) socket$unix(0x1, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xa12, 0x2, &(0x7f0000000340)=[{&(0x7f0000000180)="ca9ff26bf407dff82c4f5196ab04612067c4729656d3792250e133626e5c6c4e5da5bf07bff39f38b9d92f9517ed72e0162d447bbf7d86e3b142c3a089e27b71b949faba1fcfba59b58b0df4ccfbe41cbbabe74d50a274e1c6c1296cea7d26cbe537e9d104b85b3ddeba10ddc07ac644046aebecf19609", 0x77, 0x10001}, {0x0, 0x0, 0x1}], 0x48000, &(0x7f0000000380)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0xffff}}, {@shortname_win95}, {@rodir}, {@rodir}, {@rodir}], [{@obj_type={'obj_type', 0x3d, 'security.ima\x00'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@audit}, {@smackfsdef={'smackfsdef', 0x3d, 'security.ima\x00'}}, {@dont_hash}]}) symlinkat(0x0, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) lstat(&(0x7f0000009580)='./file0/../file0\x00', &(0x7f00000095c0)) mount$tmpfs(0x0, &(0x7f0000009500)='./file0/../file0\x00', &(0x7f0000009540), 0x0, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000340)=[{&(0x7f0000000180)="ca9ff26bf407dff82c4f5196ab04612067c4729656d3792250e133626e5c6c4e5da5bf07bff39f38b9d92f9517ed72e0162d447bbf7d86e3b142c3a089e27b71b949faba1fcfba59b58b0df4ccfbe41cbbabe74d50a274e1c6c1296cea7d26cbe537e9d104b85b3ddeba10ddc07ac644046aebecf19609a85f2dd9fab1", 0x7d, 0x10001}, {0x0, 0x0, 0x1}], 0x48000, &(0x7f0000000380)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0xffff}}, {@shortname_win95}, {@rodir}, {@rodir}], [{@obj_type={'obj_type', 0x3d, 'security.ima\x00'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@audit}, {@smackfsdef={'smackfsdef', 0x3d, 'security.ima\x00'}}, {@dont_hash}]}) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000440)='./file0\x00') r3 = syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xa12, 0x2, &(0x7f0000000340)=[{&(0x7f0000000180)="ca9ff26bf407dff82c4f5196ab04612067c4729656d3792250e133626e5c6c4e5da5bf07bff39f38b9d92f9517ed72e0162d447bbf7d86e3b142c3a089e27b71b949faba1fcfba59b58b0df4ccfbe41cbbabe74d50a274e1c6c1296cea7d26cbe537e9d104b85b3ddeba10ddc07ac644046aebecf19609a85f2dd9fab127eff08ace7a", 0x83, 0x10001}, {&(0x7f0000000240)="9a9a5317cfe4c50fabbcd0d9d336190c8cae1144a2108abf027160ca64d89931f502c8bd785eb796fd88ef3cfcee37bdd3832a1901df89e23a69db1b9d6f36b33f0ed0831d83e625a2ecc2370f2d0d2c8b74a36a6d75edd76978e58c2262e51e8daa574eedf53f28483c24c6c6439929dc711341a541b8a5a9333c5d5b5c00b5c529d15a195f39700e615653955ce69b57029fdbb8cac5d403fa81bfb4009e8cb2a1b43c423050abc0230c046308fa9557d293424c3d14cc667a655f152ef4e7077bbbcf5fad3ef0c47f87d89c3e738b2c9e7b26c56dd31862cd4ee7bee33b93", 0xe0, 0x1}], 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000440)='./file0\x00') syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x48000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$unix(r1, 0x0, 0x80) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, 0x0) [ 1078.548268] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:31 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="e877de85346eec0a1da2e3e0ce706b066f725a67efb19dc97ad8919cbaaaac2be06ceadf196b8417ef683293acb7fbe25dbb42b0cf9a917697f83d2d22319652e199455ecd095278eea0ca3d1637a9b09db4f7fd19ae867373e82c34e2c287ea413aa60a2527cea344c6195c7947ecf1a0eb789797f047e544f974241436bf9e4185b064df874806aab72c6681e015f1b4a9a00e806ab3282cf80d78492aa3a1bbd8ef5326079fda8d8a87d0a6b3a6489bfa62973f11445b6a68802874ecf437f31b2ea49ed3e58cf086b198dba3d3e845", 0xd1, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev, 0x9}, 0x1c) 19:51:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 19:51:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e010000000000000000003a00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "81c70a4819d7e271"}) [ 1078.602499] device team0 left promiscuous mode [ 1078.602509] device team_slave_0 left promiscuous mode [ 1078.602791] bridge0: port 12(team0) entered disabled state [ 1078.621839] 8021q: adding VLAN 0 to HW filter on device team0 [ 1078.624030] device team0 entered promiscuous mode [ 1078.624040] device team_slave_0 entered promiscuous mode [ 1078.635056] bond0: Enslaving team0 as an active interface with an up link [ 1078.635119] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1078.636814] bond0: Releasing backup interface team0 [ 1078.637360] device team0 left promiscuous mode [ 1078.637369] device team_slave_0 left promiscuous mode [ 1079.011845] bridge0: port 12(team0) entered blocking state [ 1079.011933] bridge0: port 12(team0) entered disabled state [ 1079.016325] device team0 entered promiscuous mode [ 1079.016336] device team_slave_0 entered promiscuous mode 19:51:32 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2f, 0x0, 0x0) 19:51:32 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000740)="f4", 0x1, 0x4}, {&(0x7f0000000840)="e4", 0x1}], 0x0, 0x0) 19:51:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000002740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 19:51:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440a09000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:32 executing program 4: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240), &(0x7f0000000080)={0x4}, 0x0, &(0x7f0000000140)={0x0, r0+10000000}, 0x0) 19:51:32 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "81"}}, 0x119) 19:51:32 executing program 4: timer_create(0x0, &(0x7f0000001200)={0x0, 0x0, 0x1}, &(0x7f0000001240)) clock_gettime(0x0, &(0x7f0000001140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000001180)={{0x77359400}, {0x0, r0+10000000}}, &(0x7f0000001300)) 19:51:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg(r0, &(0x7f0000005400)={0x0, 0x0, 0x0}, 0x0) 19:51:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000500)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x94}]}, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x15, &(0x7f00000012c0)="333beea2", 0x4) 19:51:32 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0x5, 0xe5, 0x0, 0x9777}, {0xfff8}]}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) [ 1079.506921] hid-generic 0000:0000:0000.0007: item fetching failed at offset 0/1 [ 1079.507273] hid-generic: probe of 0000:0000:0000.0007 failed with error -22 [ 1079.525997] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1079.526159] device team0 left promiscuous mode [ 1079.526167] device team_slave_0 left promiscuous mode [ 1079.526426] bridge0: port 12(team0) entered disabled state [ 1079.552145] 8021q: adding VLAN 0 to HW filter on device team0 [ 1079.553893] device team0 entered promiscuous mode [ 1079.553904] device team_slave_0 entered promiscuous mode [ 1079.554542] bond0: Enslaving team0 as an active interface with an up link [ 1079.575109] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1079.579060] bond0: Releasing backup interface team0 [ 1079.581445] device team0 left promiscuous mode [ 1079.581456] device team_slave_0 left promiscuous mode [ 1079.750675] bridge0: port 12(team0) entered blocking state [ 1079.752914] bridge0: port 12(team0) entered disabled state 19:51:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x5ea, 0x0, 0x33ea, 0x0, 0x8000, 0x7ff}) 19:51:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='shortname=win95,uni_xlate=1,', @ANYBLOB=',fscontext=u']) 19:51:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440c09000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:32 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:32 executing program 4: getgroups(0x1, &(0x7f0000000600)=[0xee01]) [ 1079.755297] device team0 entered promiscuous mode [ 1079.755308] device team_slave_0 entered promiscuous mode 19:51:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {}]}) 19:51:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x21, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x21, &(0x7f00000012c0)='3', 0x1) [ 1079.982340] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1079.990625] device team0 left promiscuous mode [ 1079.995732] device team_slave_0 left promiscuous mode [ 1080.001828] bridge0: port 12(team0) entered disabled state [ 1080.016896] 8021q: adding VLAN 0 to HW filter on device team0 [ 1080.060010] device team0 entered promiscuous mode [ 1080.087794] device team_slave_0 entered promiscuous mode [ 1080.112432] bond0: Enslaving team0 as an active interface with an up link 19:51:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x127d, 0xffffffffffffffff) 19:51:33 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x401870c8, 0xffffffffffffffff) 19:51:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x8, &(0x7f00000012c0)='3', 0x1) 19:51:33 executing program 4: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) [ 1080.130488] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1080.140927] bond0: Releasing backup interface team0 [ 1080.141485] device team0 left promiscuous mode [ 1080.141495] device team_slave_0 left promiscuous mode 19:51:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) 19:51:33 executing program 3: clock_gettime(0x0, &(0x7f0000000100)={0x0}) pselect6(0x40, &(0x7f0000000240), &(0x7f0000000080)={0x4}, 0x0, &(0x7f0000000140)={r0}, 0x0) 19:51:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440e09000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1080.648809] bridge0: port 12(team0) entered blocking state [ 1080.648895] bridge0: port 12(team0) entered disabled state [ 1080.650855] device team0 entered promiscuous mode [ 1080.650865] device team_slave_0 entered promiscuous mode [ 1080.689507] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1080.712192] device team0 left promiscuous mode [ 1080.718007] device team_slave_0 left promiscuous mode [ 1080.724128] bridge0: port 12(team0) entered disabled state [ 1080.726705] 8021q: adding VLAN 0 to HW filter on device team0 [ 1080.727550] device team0 entered promiscuous mode [ 1080.727559] device team_slave_0 entered promiscuous mode [ 1080.728174] bond0: Enslaving team0 as an active interface with an up link [ 1080.730844] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1080.731775] bond0: Releasing backup interface team0 [ 1080.732219] device team0 left promiscuous mode [ 1080.732227] device team_slave_0 left promiscuous mode 19:51:33 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x3, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x86}}, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:33 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000500)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x99}]}, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:33 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 19:51:33 executing program 3: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x60, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}}) [ 1080.890449] bridge0: port 12(team0) entered blocking state [ 1080.917525] bridge0: port 12(team0) entered disabled state 19:51:33 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000500)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1080.940614] device team0 entered promiscuous mode [ 1080.953621] device team_slave_0 entered promiscuous mode 19:51:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb441009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:33 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000002740)=[{{&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x80, 0x0}}], 0x1, 0x0) 19:51:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e010000000000000000003a00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r2, r3, 0x0) 19:51:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1b, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) [ 1081.064057] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:33 executing program 4: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:51:34 executing program 1: syz_mount_image$ext4(&(0x7f00000006c0)='ext3\x00', &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)={[{@barrier}]}) [ 1081.114649] device team0 left promiscuous mode [ 1081.114658] device team_slave_0 left promiscuous mode [ 1081.114934] bridge0: port 12(team0) entered disabled state [ 1081.129760] 8021q: adding VLAN 0 to HW filter on device team0 [ 1081.141093] device team0 entered promiscuous mode [ 1081.141105] device team_slave_0 entered promiscuous mode [ 1081.141765] bond0: Enslaving team0 as an active interface with an up link [ 1081.145782] bond0: Releasing backup interface team0 [ 1081.146186] device team0 left promiscuous mode [ 1081.146196] device team_slave_0 left promiscuous mode [ 1081.564480] bridge0: port 12(team0) entered blocking state [ 1081.564565] bridge0: port 12(team0) entered disabled state [ 1081.565771] device team0 entered promiscuous mode [ 1081.565780] device team_slave_0 entered promiscuous mode 19:51:34 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xf, &(0x7f00000012c0)='3', 0x1) 19:51:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x9777}]}) 19:51:34 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000500)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:34 executing program 1: syz_open_dev$vcsn(&(0x7f0000000040), 0xffffffffffffffff, 0x0) 19:51:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb441809000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x5450, 0xffffffffffffffff) 19:51:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xf, &(0x7f00000012c0)='3', 0x1) 19:51:34 executing program 4: mount$bind(&(0x7f0000000040)='./file0/file0/file0\x00', 0x0, 0x0, 0x0, 0x0) [ 1081.785231] device team0 left promiscuous mode [ 1081.804776] device team_slave_0 left promiscuous mode 19:51:34 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001dc0), 0x1010c0, 0x0) [ 1081.844140] bridge0: port 12(team0) entered disabled state 19:51:34 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x81) 19:51:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xf, &(0x7f00000012c0)='3', 0x1) [ 1081.897511] 8021q: adding VLAN 0 to HW filter on device team0 19:51:34 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:51:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "44b5881fe2e4366235542cbda52fe6191bf96bef61bccc4f83ca61d52d0e14cf3eb7dfdedcaaf4489146b4cd55af69f9b41d45879bd42a850a86e758ffcab2"}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="cc1f503713db94849ea22178b5", 0xd}, {0x0}, {&(0x7f0000000140)="b8", 0x1}], 0x3, &(0x7f00000001c0)=[{0x28, 0x0, 0x0, "77c679ac31968bb204d077189ccb517717"}], 0x28}, 0x0) [ 1081.946010] device team0 entered promiscuous mode 19:51:34 executing program 1: syz_mount_image$ext4(&(0x7f00000006c0)='ext3\x00', &(0x7f0000000700)='./file0\x00', 0x0, 0x1, &(0x7f0000000cc0)=[{0x0}], 0x0, &(0x7f0000000d80)) [ 1081.981533] device team_slave_0 entered promiscuous mode [ 1082.001136] bond0: Enslaving team0 as an active interface with an up link 19:51:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xf, &(0x7f00000012c0)='3', 0x1) [ 1082.037963] bond0: Releasing backup interface team0 [ 1082.056570] device team0 left promiscuous mode 19:51:34 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8501, 0x0) [ 1082.083800] device team_slave_0 left promiscuous mode 19:51:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb446009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:35 executing program 1: syz_open_dev$loop(&(0x7f0000000080), 0xfffffffffffffffe, 0x243) 19:51:35 executing program 3: syz_clone(0x60000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)) 19:51:35 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x541b, 0x0) 19:51:35 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1082.286201] bridge0: port 12(team0) entered blocking state [ 1082.291951] bridge0: port 12(team0) entered disabled state [ 1082.299169] device team0 entered promiscuous mode [ 1082.304908] device team_slave_0 entered promiscuous mode 19:51:35 executing program 4: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) clock_gettime(0x3, &(0x7f0000000040)) 19:51:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_open_pts(r0, 0x0) [ 1082.378141] device team0 left promiscuous mode [ 1082.388594] device team_slave_0 left promiscuous mode 19:51:35 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x100060, 0xa808) [ 1082.432479] IPVS: ftp: loaded support on port[0] = 21 [ 1082.439901] bridge0: port 12(team0) entered disabled state 19:51:35 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300), 0x802, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000340), 0x6) 19:51:35 executing program 1: ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000300)={0x0, 0x0, 0x0, &(0x7f0000000240)=""/59, 0x0}) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000600)={0x4, &(0x7f0000000580)=[{0x0, 0x0, 0x6}, {0x100, 0x0, 0x4, 0x800}, {}, {}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000640)) [ 1082.492683] 8021q: adding VLAN 0 to HW filter on device team0 [ 1082.513362] device team0 entered promiscuous mode [ 1082.518578] device team_slave_0 entered promiscuous mode [ 1082.528039] bond0: Enslaving team0 as an active interface with an up link 19:51:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000180)=@sco, &(0x7f00000000c0)=0x80) [ 1082.550090] bond0: Releasing backup interface team0 [ 1082.556518] device team0 left promiscuous mode [ 1082.571250] device team_slave_0 left promiscuous mode [ 1082.730692] bridge0: port 12(team0) entered blocking state [ 1082.736460] bridge0: port 12(team0) entered disabled state [ 1082.743120] device team0 entered promiscuous mode [ 1082.747980] device team_slave_0 entered promiscuous mode 19:51:37 executing program 5: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240)={0x20}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7f, 0xfffffffffffffffc}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000140)={r0, r1+10000000}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x3ff]}, 0x8}) sched_rr_get_interval(0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:51:37 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x100060, 0xa808) 19:51:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0x5, 0x0, 0x0, 0x9777}, {}]}) 19:51:37 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000000c0)={0x8}) 19:51:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000a000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:37 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000740)="f4", 0x1}, {&(0x7f0000000840)="e4d68ecdf098939f88de8bd3bbf717be80f58b55ddf2021dd1f8c48c0595d3056852c00c3b87d75cb950e7807645faa68a53dba83d24516e5ad13d649f7688ec60cf1a3043139ce548e44642c38f176327e0d2ad94c498ba5a3b4d24d51af77581dd2e2ea4de407321654a93a5b1d5632089f4a228de95febdee59eb87eecd281c3b782021f5035f0660accd2fe2fd2f9f83b8f04aa29c93e234eb9edaacc764757f53670dc772aa7a34914313f203b8f0811b371d4395bcf0559d752088da5c5a71", 0xc2, 0x4}, {&(0x7f0000000940)='b', 0x1}], 0x0, 0x0) 19:51:38 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x22441, 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) 19:51:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000010000000000000001"], 0x30}}, 0x0) 19:51:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_KEY={0xc, 0x50, 0x0, 0x1, [@NL80211_KEY_IDX={0x5}]}]}, 0x34}}, 0x0) [ 1085.192287] validate_nla: 5 callbacks suppressed [ 1085.192297] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1085.192450] device team0 left promiscuous mode [ 1085.192459] device team_slave_0 left promiscuous mode [ 1085.194062] bridge0: port 12(team0) entered disabled state [ 1085.212287] 8021q: adding VLAN 0 to HW filter on device team0 [ 1085.217836] device team0 entered promiscuous mode [ 1085.217847] device team_slave_0 entered promiscuous mode [ 1085.218901] bond0: Enslaving team0 as an active interface with an up link [ 1085.224235] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1085.225999] bond0: Releasing backup interface team0 [ 1085.226543] device team0 left promiscuous mode 19:51:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x54, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY={0x30, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP104={0x11, 0x1, "c36dfa077c6de90ea5561cb48f"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_IDX={0x5}, @NL80211_KEY_DEFAULT_TYPES={0x4}]}]}, 0x54}}, 0x0) 19:51:38 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x100060, 0xa808) [ 1085.226552] device team_slave_0 left promiscuous mode 19:51:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, '$\x00\'7l'}, @NL80211_ATTR_KEY_IDX={0x5}]}, 0x30}}, 0x0) 19:51:38 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, 0x0, 0xa808) 19:51:38 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000f80)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, 0x0) 19:51:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY={0x8, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_MGMT={0x4}]}]}, 0x24}}, 0x0) 19:51:38 executing program 5: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x5421, &(0x7f0000000000)) [ 1085.587339] bridge0: port 12(team0) entered blocking state [ 1085.593505] bridge0: port 12(team0) entered disabled state [ 1085.605837] device team0 entered promiscuous mode [ 1085.610871] device team_slave_0 entered promiscuous mode 19:51:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x24}}, 0x0) 19:51:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000b000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000200)={0x80, 0x3f, 0x7e, 0x0, 0x0}) close(r0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00c642d, &(0x7f0000000100)={r2}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000000c0)={r3}) 19:51:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8}]}, 0x34}}, 0x0) 19:51:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f00000017c0)=[{{&(0x7f0000000040)=@abs, 0x6e, 0x0}}], 0x1, 0x0) 19:51:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x2, &(0x7f0000000000)) [ 1085.866677] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1085.866841] device team0 left promiscuous mode [ 1085.866850] device team_slave_0 left promiscuous mode [ 1085.867230] bridge0: port 12(team0) entered disabled state [ 1085.882580] 8021q: adding VLAN 0 to HW filter on device team0 19:51:38 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000300)={@link_local, @multicast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local, @broadcast}}}}}, 0x0) 19:51:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}}) [ 1086.050065] device team0 entered promiscuous mode [ 1086.050077] device team_slave_0 entered promiscuous mode [ 1086.058376] bond0: Enslaving team0 as an active interface with an up link [ 1086.058446] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1086.060619] bond0: Releasing backup interface team0 [ 1086.065498] device team0 left promiscuous mode [ 1086.065509] device team_slave_0 left promiscuous mode [ 1086.323921] bridge0: port 12(team0) entered blocking state [ 1086.324007] bridge0: port 12(team0) entered disabled state [ 1086.325251] device team0 entered promiscuous mode [ 1086.325260] device team_slave_0 entered promiscuous mode 19:51:39 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, 0x0, 0xa808) 19:51:39 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x5452, &(0x7f0000000000)) 19:51:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x36f}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x100}]}, 0x34}}, 0x0) 19:51:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8}]}, 0x34}}, 0x0) 19:51:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY={0x4}]}, 0x20}}, 0x0) 19:51:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000c000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1}}) 19:51:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x40086602, &(0x7f0000000000)) 19:51:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8}]}, 0x34}}, 0x0) 19:51:39 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000640)='ns/time\x00') [ 1086.594159] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:39 executing program 5: syz_clone(0x17643938cecc0664, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1086.652428] device team0 left promiscuous mode [ 1086.652438] device team_slave_0 left promiscuous mode [ 1086.652705] bridge0: port 12(team0) entered disabled state [ 1086.667531] 8021q: adding VLAN 0 to HW filter on device team0 [ 1086.671558] device team0 entered promiscuous mode [ 1086.671568] device team_slave_0 entered promiscuous mode [ 1086.675372] bond0: Enslaving team0 as an active interface with an up link 19:51:39 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000f80)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 1086.682754] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1086.688351] bond0: Releasing backup interface team0 [ 1086.701403] device team0 left promiscuous mode [ 1086.701413] device team_slave_0 left promiscuous mode [ 1087.116667] bridge0: port 12(team0) entered blocking state [ 1087.116756] bridge0: port 12(team0) entered disabled state [ 1087.118246] device team0 entered promiscuous mode [ 1087.118256] device team_slave_0 entered promiscuous mode 19:51:40 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, 0x0, 0xa808) 19:51:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0) 19:51:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1}}) 19:51:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x58, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP104={0x11, 0x1, "c36dfa077c6de90ea5561cb48f"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_IDX={0x5}, @NL80211_KEY_DEFAULT_TYPES={0x4}, @NL80211_KEY_DEFAULT={0x4}]}]}, 0x58}}, 0x0) 19:51:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8}]}, 0x34}}, 0x0) 19:51:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000e000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) [ 1087.395223] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1087.407283] device team0 left promiscuous mode [ 1087.417160] device team_slave_0 left promiscuous mode [ 1087.423098] bridge0: port 12(team0) entered disabled state [ 1087.431726] 8021q: adding VLAN 0 to HW filter on device team0 19:51:40 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0) 19:51:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000640)={'sit0\x00', &(0x7f00000005c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @remote}}) [ 1087.441979] device team0 entered promiscuous mode [ 1087.441989] device team_slave_0 entered promiscuous mode [ 1087.442614] bond0: Enslaving team0 as an active interface with an up link 19:51:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x100}]}, 0x2c}}, 0x0) [ 1087.462645] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1087.463973] bond0: Releasing backup interface team0 [ 1087.464369] device team0 left promiscuous mode [ 1087.464378] device team_slave_0 left promiscuous mode 19:51:40 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000a40)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000037"], 0x2c}}, 0x0) 19:51:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x4}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x4}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8}]}, 0x34}}, 0x0) [ 1087.859749] bridge0: port 12(team0) entered blocking state [ 1087.859844] bridge0: port 12(team0) entered disabled state [ 1087.861691] device team0 entered promiscuous mode [ 1087.861703] device team_slave_0 entered promiscuous mode [ 1088.030680] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 19:51:41 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0xa808) 19:51:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x2, &(0x7f00000001c0)=[{}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 19:51:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) bind$unix(r0, 0x0, 0x0) 19:51:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000f000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:41 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x7) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x512, 0x4) recvmmsg(r0, &(0x7f00000010c0)=[{{0x0, 0x3, 0x0, 0x0, 0x0, 0xfc00000000000000}}], 0x300, 0x2, 0x0) 19:51:41 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000100)={0x3c0, 0xc}) 19:51:41 executing program 5: syz_emit_ethernet(0x4f, &(0x7f0000000140)={@local, @random="6a20fa532355", @val, {@generic={0x0, "f626c73570e84cb17a9bffe8f6883978374b3a2471eaaa5d5c205711ca8ecc943d369e0eaa98f67ec88818298fd710ea9d5e5d3a85ba263c19"}}}, 0x0) 19:51:41 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x7) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast1}}) 19:51:41 executing program 3: sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0xe2d9da89c31717b5) [ 1088.384002] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1088.384158] device team0 left promiscuous mode [ 1088.384167] device team_slave_0 left promiscuous mode [ 1088.384426] bridge0: port 12(team0) entered disabled state [ 1088.418936] 8021q: adding VLAN 0 to HW filter on device team0 19:51:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x5, 0x0, 0x0) [ 1088.567895] device team0 entered promiscuous mode [ 1088.567906] device team_slave_0 entered promiscuous mode [ 1088.568618] bond0: Enslaving team0 as an active interface with an up link 19:51:41 executing program 3: getrandom(&(0x7f0000000140)=""/128, 0x80, 0x0) [ 1088.571785] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1088.574282] bond0: Releasing backup interface team0 [ 1088.574791] device team0 left promiscuous mode [ 1088.574801] device team_slave_0 left promiscuous mode 19:51:41 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) [ 1088.879389] bridge0: port 12(team0) entered blocking state [ 1088.885325] bridge0: port 12(team0) entered disabled state [ 1088.892867] device team0 entered promiscuous mode [ 1088.892878] device team_slave_0 entered promiscuous mode 19:51:41 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0xa808) 19:51:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e22, @broadcast}, 0x10) 19:51:41 executing program 4: sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001480), 0xffffffffffffffff) 19:51:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440011000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:42 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='uid_map\x00') 19:51:42 executing program 5: ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) getresgid(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000140)) 19:51:42 executing program 4: mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:51:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000a00), 0xffffffffffffffff) [ 1089.120957] device team0 left promiscuous mode [ 1089.126671] device team_slave_0 left promiscuous mode [ 1089.133565] bridge0: port 12(team0) entered disabled state [ 1089.147414] 8021q: adding VLAN 0 to HW filter on device team0 19:51:42 executing program 5: syz_open_dev$rtc(&(0x7f0000000900), 0x0, 0x804c0) [ 1089.157381] device team0 entered promiscuous mode [ 1089.157391] device team_slave_0 entered promiscuous mode [ 1089.158072] bond0: Enslaving team0 as an active interface with an up link 19:51:42 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000040)) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 19:51:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @private}, @local, @private2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3100000}) 19:51:42 executing program 3: syz_open_dev$usbfs(&(0x7f0000000040), 0xffffffffffffffff, 0x0) [ 1089.164067] bond0: Releasing backup interface team0 [ 1089.164461] device team0 left promiscuous mode [ 1089.164471] device team_slave_0 left promiscuous mode [ 1089.749689] bridge0: port 12(team0) entered blocking state [ 1089.749774] bridge0: port 12(team0) entered disabled state [ 1089.751053] device team0 entered promiscuous mode [ 1089.751062] device team_slave_0 entered promiscuous mode 19:51:42 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0xa808) 19:51:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, 0x0, 0x0) 19:51:42 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0xffffffff}) 19:51:42 executing program 3: socket(0x28, 0x0, 0x8) 19:51:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@mcast2, 0x0, 0x33}, 0x0, @in=@remote, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) 19:51:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440012000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='uid_map\x00') mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x100000e, 0x10, r0, 0x0) 19:51:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_targets\x00') inotify_rm_watch(r0, 0x0) 19:51:42 executing program 5: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000340)) 19:51:42 executing program 4: getresgid(&(0x7f00000000c0), 0x0, 0x0) 19:51:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440014000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={&(0x7f0000000280)=@newtaction={0xec4, 0x30, 0x8, 0x70bd2a, 0x0, {}, [{0x248, 0x1, [@m_bpf={0xac, 0x13, 0x0, 0x0, {{0x8}, {0x1c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x4, 0x200}}]}, {0x69, 0x6, "21f150360dc033a7b6e26257483f4f4944a554baa653ac9a6db390e1aaa12e719f6ee7405c65326a2fce76f72b40bbd2a42d6412d785864c865acfbaef2ce24f4c9a6afac168db6f72ddb65b644829b906e442445723a3f40480c03393a2cccd548290fb12"}, {0xc, 0x7, {0x1}}, {0xc}}}, @m_tunnel_key={0xd0, 0x0, 0x0, 0x0, {{0xf}, {0x44, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @mcast1}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @dev}}]}, {0x5d, 0x6, "f2a72777d6cdca1d03d274b46cdd3a6778c62dba83b3c47c68f4b18bd17f5bdb33d69ca76dc4a1ff0aa677acedb80c937f2e91f1143d049ceb60798bc8aeb9dd94e6e029588fa373ecb6c90eb94f70ffec661404d2d8b47219"}, {0xc}, {0xc}}}, @m_tunnel_key={0xc8, 0x0, 0x0, 0x0, {{0xf}, {0x3c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @dev}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x5d, 0x6, "ca71f272ea9fe2a3c8719bc2f104f9f85cb45a6cd10383a095a058581354e944c485bfb5e21d5229677857646ef316855b1105caf848f61583f14a8c98ed602b02568f62cbecb028e9a46324b82beb03cd89b890a590ccdddf"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}]}, {0xc68, 0x1, [@m_police={0x8f4, 0x0, 0x0, 0x0, {{0xb}, {0x868, 0x2, 0x0, 0x1, [[@TCA_POLICE_RESULT={0x8, 0x5, 0x7fff}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x35}, @TCA_POLICE_RATE64={0xc}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x13d7, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff800, 0x6, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x622b, 0x0, 0x0, 0xd9e4, 0x0, 0xf8, 0x0, 0x0, 0x0, 0xdbc5, 0x3, 0x7, 0x0, 0x1, 0xc68, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x3, 0x0, 0x0, 0x0, 0xb6000000, 0x6, 0x0, 0x8001]}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xffffff8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x320f, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x0, 0x0, 0x83f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1bb, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x1, 0x8001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2304, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5763, 0x0, 0x8, 0x0, 0x0, 0x9fa1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {}, {0x0, 0x0, 0x1}}}]]}, {0x61, 0x6, "ff0449630218da5eb6565aeef93a979700faee050c41a605bbb994ce503145d8cdbb617e76267503350516fa2462495a5532cafbe34ee6acbe5184e0386ebc41731f2af3a697fa1c8de61ac74d4ebf348aba09f00c23d950efc6ce832d"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_bpf={0x10c, 0x0, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{}, {}]}]}, {0xc5, 0x6, "8c56a70e5597c3ae5511a78822a933fff117f369af37fe43089b818f0d360101e9fa600b0f82812be975b0c54dff85990a85aadca1a05113eb1bbe60086af660b31c59f900ad4b5babf60b65ef3a430665f9e3af5727e443ea0afeeb712e077507f7de7b6eb28db11bc546f26c85e2a286e9cea11d7420386dedc0926a14df60bf71b668a0af1fcb76d5e85a6ec1a3dfdf847bfbf35646b6f66768986ce9cd8ab96e0f6f327bb5a81668b0005e72e7a8e6c87f097b2d8f854c0a32cb67aadb5610"}, {0xc}, {0xc}}}, @m_gact={0x264, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x235, 0x6, "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"}, {0xc}, {0xc}}}]}]}, 0xec4}}, 0x0) [ 1090.284413] validate_nla: 3 callbacks suppressed [ 1090.284424] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1090.293135] device team0 left promiscuous mode [ 1090.293143] device team_slave_0 left promiscuous mode [ 1090.293391] bridge0: port 12(team0) entered disabled state [ 1090.302471] 8021q: adding VLAN 0 to HW filter on device team0 [ 1090.310220] device team0 entered promiscuous mode [ 1090.310230] device team_slave_0 entered promiscuous mode [ 1090.310809] bond0: Enslaving team0 as an active interface with an up link [ 1090.334812] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1090.340391] bond0: Releasing backup interface team0 [ 1090.342696] device team0 left promiscuous mode [ 1090.342706] device team_slave_0 left promiscuous mode 19:51:43 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0x0) 19:51:43 executing program 5: syz_open_procfs(0x0, &(0x7f00000002c0)='mountstats\x00') 19:51:43 executing program 4: pipe2$9p(0x0, 0x82800) 19:51:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x18}, 0x48) 19:51:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, @private}, 0x10) 19:51:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440015000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1090.788660] bridge0: port 12(team0) entered blocking state [ 1090.795024] bridge0: port 12(team0) entered disabled state [ 1090.802972] device team0 entered promiscuous mode [ 1090.807960] device team_slave_0 entered promiscuous mode 19:51:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4010, 0x0, 0x0) 19:51:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 19:51:43 executing program 1: syz_open_dev$sndpcmc(&(0x7f00000000c0), 0x89cccf2, 0x4000) [ 1090.924727] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000440)='net/dev_snmp6\x00') [ 1090.992884] device team0 left promiscuous mode [ 1091.027257] device team_slave_0 left promiscuous mode 19:51:43 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0x0) 19:51:43 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') [ 1091.057889] bridge0: port 12(team0) entered disabled state 19:51:43 executing program 1: syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x1481) 19:51:43 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 19:51:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5}]}) [ 1091.110864] 8021q: adding VLAN 0 to HW filter on device team0 [ 1091.153340] device team0 entered promiscuous mode [ 1091.186499] device team_slave_0 entered promiscuous mode 19:51:44 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0x0) 19:51:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x6e6bbf}, {{@in6=@private0}, 0x0, @in=@multicast2}}, 0xe8) [ 1091.227994] bond0: Enslaving team0 as an active interface with an up link [ 1091.287284] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1091.319634] bond0: Releasing backup interface team0 [ 1091.390995] device team0 left promiscuous mode [ 1091.400682] device team_slave_0 left promiscuous mode 19:51:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440017000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x20}]}) 19:51:44 executing program 4: getresuid(&(0x7f0000000080), &(0x7f00000000c0), 0x0) 19:51:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@mcast2, 0x0, 0x33}, 0x0, @in=@remote, 0x0, 0x1}}, 0xe8) 19:51:44 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001780)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, 0x0}, 0x68) 19:51:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr=0x64010102}, {0x2, 0x0, @local}, 0x14}) [ 1091.658042] bridge0: port 12(team0) entered blocking state [ 1091.663957] bridge0: port 12(team0) entered disabled state [ 1091.670292] device team0 entered promiscuous mode [ 1091.676520] device team_slave_0 entered promiscuous mode 19:51:44 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000880), 0xffffffffffffffff) 19:51:44 executing program 4: r0 = memfd_create(&(0x7f0000000180)='net/udplite\x00', 0x0) syz_open_procfs(0x0, 0x0) mmap(&(0x7f0000002000/0x7000)=nil, 0x7000, 0x1000003, 0x12, r0, 0x0) 19:51:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @multicast2}}) [ 1091.762256] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1091.776837] device team0 left promiscuous mode [ 1091.784190] device team_slave_0 left promiscuous mode [ 1091.792544] bridge0: port 12(team0) entered disabled state 19:51:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e24, @private}, 0x10) 19:51:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f00000001c0)='Lm', 0x2, 0x0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) [ 1091.824275] 8021q: adding VLAN 0 to HW filter on device team0 [ 1091.831087] device team0 entered promiscuous mode [ 1091.861358] device team_slave_0 entered promiscuous mode [ 1091.884184] bond0: Enslaving team0 as an active interface with an up link [ 1091.922538] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740)={&(0x7f0000000080)={0x34, r1, 0x229, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x34}}, 0x0) [ 1091.950232] bond0: Releasing backup interface team0 [ 1091.983234] device team0 left promiscuous mode [ 1091.996035] device team_slave_0 left promiscuous mode 19:51:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440018000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:45 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') 19:51:45 executing program 1: r0 = syz_open_dev$rtc(&(0x7f0000000140), 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) 19:51:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0) 19:51:45 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000840), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), r0) 19:51:45 executing program 2: syz_open_dev$sndpcmc(&(0x7f00000015c0), 0x0, 0xc0a00) [ 1092.156320] bridge0: port 12(team0) entered blocking state [ 1092.162128] bridge0: port 12(team0) entered disabled state [ 1092.168600] device team0 entered promiscuous mode [ 1092.175069] device team_slave_0 entered promiscuous mode 19:51:45 executing program 2: memfd_create(0x0, 0x6d) 19:51:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0) [ 1092.287052] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x0, @remote}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'ip_vti0\x00'}) 19:51:45 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, 0x0) 19:51:45 executing program 5: ioctl$PTP_PEROUT_REQUEST(0xffffffffffffffff, 0x40383d03, 0x0) [ 1092.329295] device team0 left promiscuous mode [ 1092.375525] device team_slave_0 left promiscuous mode 19:51:45 executing program 2: mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) [ 1092.398587] bridge0: port 12(team0) entered disabled state [ 1092.440167] 8021q: adding VLAN 0 to HW filter on device team0 [ 1092.484804] device team0 entered promiscuous mode [ 1092.494911] device team_slave_0 entered promiscuous mode [ 1092.503524] bond0: Enslaving team0 as an active interface with an up link [ 1092.511109] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1092.526601] bond0: Releasing backup interface team0 [ 1092.537004] device team0 left promiscuous mode [ 1092.550958] device team_slave_0 left promiscuous mode 19:51:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001a000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 19:51:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0) 19:51:45 executing program 1: sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) 19:51:45 executing program 2: pipe2$9p(&(0x7f0000000180), 0x0) 19:51:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740)={&(0x7f0000000080)={0x24, r1, 0x229, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_SOPASS={0x4}, @ETHTOOL_A_WOL_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x24}}, 0x0) [ 1092.675346] bridge0: port 12(team0) entered blocking state [ 1092.681061] bridge0: port 12(team0) entered disabled state [ 1092.688281] device team0 entered promiscuous mode [ 1092.693754] device team_slave_0 entered promiscuous mode 19:51:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast2}, {0x6, @multicast}, 0x1a, {0x2, 0x0, @remote}, 'veth0_macvtap\x00'}) 19:51:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0) 19:51:45 executing program 1: ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}}) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 19:51:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) prctl$PR_GET_UNALIGN(0x5, 0x0) syz_open_dev$vcsu(&(0x7f0000000980), 0x1, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000a00), r0) syz_genetlink_get_family_id$team(&(0x7f0000001480), 0xffffffffffffffff) [ 1092.826998] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1092.835341] device team0 left promiscuous mode [ 1092.842424] device team_slave_0 left promiscuous mode [ 1092.856871] bridge0: port 12(team0) entered disabled state 19:51:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000002780)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000002740)={&(0x7f0000000080)={0x1eb0, r1, 0x229, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0x89, 0x3, "bce4603b064022bf99246650cf2560cdfcf6623db8dedd574591a7b45e9896188e9cd72b985bb6970c10224e0e9ed5226f10b5abcdb67a9f2b5def74304c470ab7dd4b3cdca16c1e2a422eea7679aefc3f3fe54add143b0a18bdf8483d7a7757751395637c3f79c510d69aa4e3203e8a4d20e2c7d70f3a371031db85eb1a15dbdf4dffdffd"}, @ETHTOOL_A_WOL_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_WOL_SOPASS={0xc1, 0x3, "4eb2c4c453d1c5aaf75e56e6b3df53ebb2993d2cd91eb843684b2e8a1ccb9c4c9ab330a1212ea8806201d49af52f76b71d0fc2bb0c70de29cbd7ae03b62a45fbb73648956d28419f1fdaeca339757f1ae5981abb92fda1ac4da7f46497191baa921d21b0e99f7e985acc1c304daafcca3915a53d4ba8a51d5cf3ed53e43703d4d3b5c9db99d3a7d0fa0e5769e55d2a50c99d084ecefbc287f253c0b4ef6eb54d7c82f5f4b2a11dd1b9523add7a49e26c7c2e439d5d7912202f7a00c2ad"}, @ETHTOOL_A_WOL_MODES={0x13f0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xf5, 0x4, "064b82005a1f7cc8f94b9726302f00cdf1312eed5e7fc58646a5d89aa2b3daba3d3ad32f29e4b411194ef990a5db055fdae53138ae8324155e3c9e602211e989ceaa31a5ed3c2952ef8899cf81543a03f2c0ef4d5bdcde91e7cef06923b9e2ae7eab7c2465396d5c1abeadd89e38df32ab114f916762060bc8ab5ddcd40b202c702196d7fee11404c377538b822dcc4ee5d5b96b4073ac48cfe1e39503af27b452305107dba0a7ac8eb874a42cf11a315a0c28c55544c60f2eaf9cdc8474c014e335471b7bc1b556de66d116e1f9eae3e2e67bd8bc3354740cefe503a80007181d344c34fb835d2431020f4152445f8570"}, @ETHTOOL_A_BITSET_BITS={0x1f0, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\x1a].%U\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '){\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '-\'$\'\xb2[{\x8c[%\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ']!5/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '],}&\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '}.\xbb[\xe9\xe9#(\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '{&\\@\\.{{.\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '{${-\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '&[*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-,\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '/+#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, ':$\'\xc1+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\x02$:\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '[$\x81&\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x1001, 0x4, "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"}, @ETHTOOL_A_BITSET_BITS={0xdc, 0x3, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '@[]\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ']+\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, ':$![]]%]+*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '#.\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '*%=*\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '(+[\\{\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, ':{L\\+\'-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_WOL_SOPASS={0x8cd, 0x3, "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"}]}, 0x1eb0}}, 0x0) [ 1092.898300] 8021q: adding VLAN 0 to HW filter on device team0 19:51:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@getqdisc={0x24}, 0x24}}, 0x0) [ 1092.947885] device team0 entered promiscuous mode [ 1092.980487] device team_slave_0 entered promiscuous mode [ 1093.005500] bond0: Enslaving team0 as an active interface with an up link [ 1093.028757] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1093.047427] bond0: Releasing backup interface team0 [ 1093.056844] device team0 left promiscuous mode [ 1093.075832] device team_slave_0 left promiscuous mode 19:51:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001d000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:46 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, 0x0) 19:51:46 executing program 2: syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) 19:51:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, 0x0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000980), 0x1, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001480), 0xffffffffffffffff) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r1, 0xc01064c2, 0x0) 19:51:46 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@dev, @local, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback}, "b180be112b42ad756eb71d6e"}}}}, 0x0) 19:51:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) [ 1093.198657] bridge0: port 12(team0) entered blocking state [ 1093.205179] bridge0: port 12(team0) entered disabled state [ 1093.213136] device team0 entered promiscuous mode [ 1093.217992] device team_slave_0 entered promiscuous mode 19:51:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={&(0x7f0000000280)=@newtaction={0xec4, 0x30, 0x0, 0x0, 0x0, {}, [{0x248, 0x1, [@m_bpf={0xac, 0x0, 0x0, 0x0, {{0x8}, {0x1c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}]}, {0x69, 0x6, "21f150360dc033a7b6e26257483f4f4944a554baa653ac9a6db390e1aaa12e719f6ee7405c65326a2fce76f72b40bbd2a42d6412d785864c865acfbaef2ce24f4c9a6afac168db6f72ddb65b644829b906e442445723a3f40480c03393a2cccd548290fb12"}, {0xc}, {0xc}}}, @m_tunnel_key={0xd0, 0x0, 0x0, 0x0, {{0xf}, {0x44, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @mcast1}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @dev}}]}, {0x5d, 0x6, "f2a72777d6cdca1d03d274b46cdd3a6778c62dba83b3c47c68f4b18bd17f5bdb33d69ca76dc4a1ff0aa677acedb80c937f2e91f1143d049ceb60798bc8aeb9dd94e6e029588fa373ecb6c90eb94f70ffec661404d2d8b47219"}, {0xc}, {0xc}}}, @m_tunnel_key={0xc8, 0x0, 0x0, 0x0, {{0xf}, {0x3c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @dev}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x5d, 0x6, "ca71f272ea9fe2a3c8719bc2f104f9f85cb45a6cd10383a095a058581354e944c485bfb5e21d5229677857646ef316855b1105caf848f61583f14a8c98ed602b02568f62cbecb028e9a46324b82beb03cd89b890a590ccdddf"}, {0xc}, {0xc}}}]}, {0xc68, 0x1, [@m_police={0x8f4, 0x0, 0x0, 0x0, {{0xb}, {0x868, 0x2, 0x0, 0x1, [[@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_PEAKRATE64={0xc}, @TCA_POLICE_RATE64={0xc}, @TCA_POLICE_PEAKRATE={0x404}, @TCA_POLICE_RATE={0x404}, @TCA_POLICE_TBF={0x3c}]]}, {0x61, 0x6, "ff0449630218da5eb6565aeef93a979700faee050c41a605bbb994ce503145d8cdbb617e76267503350516fa2462495a5532cafbe34ee6acbe5184e0386ebc41731f2af3a697fa1c8de61ac74d4ebf348aba09f00c23d950efc6ce832d"}, {0xc}, {0xc}}}, @m_bpf={0x10c, 0x0, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{}, {}]}]}, {0xc5, 0x6, "8c56a70e5597c3ae5511a78822a933fff117f369af37fe43089b818f0d360101e9fa600b0f82812be975b0c54dff85990a85aadca1a05113eb1bbe60086af660b31c59f900ad4b5babf60b65ef3a430665f9e3af5727e443ea0afeeb712e077507f7de7b6eb28db11bc546f26c85e2a286e9cea11d7420386dedc0926a14df60bf71b668a0af1fcb76d5e85a6ec1a3dfdf847bfbf35646b6f66768986ce9cd8ab96e0f6f327bb5a81668b0005e72e7a8e6c87f097b2d8f854c0a32cb67aadb5610"}, {0xc}, {0xc}}}, @m_gact={0x264, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x235, 0x6, "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"}, {0xc}, {0xc}}}]}]}, 0xec4}}, 0x0) 19:51:46 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffa000/0x4000)=nil, 0x930, 0x1000004, 0x10, r0, 0x0) 19:51:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000240)={0x1, 0x0, [{0x40000108}]}) 19:51:46 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff) 19:51:46 executing program 5: syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'ascii'}}, {@utf8}]}) [ 1093.359994] device team0 left promiscuous mode [ 1093.404940] device team_slave_0 left promiscuous mode 19:51:46 executing program 2: syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_virtio(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=virtio,version=9']) [ 1093.428105] bridge0: port 12(team0) entered disabled state [ 1093.462899] 8021q: adding VLAN 0 to HW filter on device team0 [ 1093.496153] device team0 entered promiscuous mode [ 1093.546612] device team_slave_0 entered promiscuous mode [ 1093.576726] bond0: Enslaving team0 as an active interface with an up link [ 1093.579087] ISOFS: Unable to identify CD-ROM format. [ 1093.590372] bond0: Releasing backup interface team0 [ 1093.609826] device team0 left promiscuous mode [ 1093.617436] 9pnet: Unknown protocol version 9 [ 1093.622758] device team_slave_0 left promiscuous mode 19:51:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000440)="8f498bd75a3ba5bf26fa47dbf9dd968f6ab5fefaab7a6630d3bd1974ae1608796ead3a2a5b08dd2237479d855c0a37629bd4f5800f997b41b1490813cc06ef8bb516bc2fa2ed50f1975bf3dc9a9dbd3e167fc9d1cd40628106fff12c519a1f7617350a136e561f5ca5af729bfa8441746b587716d22c72f7434847846455a17b273ca6e8e67184e2451d0ecdb610f0feda67828b65eb40c939a60ce8b43c179997e0d7ada7a7b55dcd2d27588def6fce53c1e7b65081ef0a2df00562bdc6b24c5bf06c7cedc3243424f349e898718cec6eb4c895df3b9552ab9c4ae57e7b8c06017d9a707e52de215b62", 0xea}, {&(0x7f0000000540)="b36c52f91c3368e8b47bce8d2da128e18829ed6af36d913a4d80feef1bc80af75ba51aee78b8485e957ce30753342094e34fea342e9b122b38a6e68d55ec76ec12eadd44d1daa99dcef3f09f850914e536eda80018", 0x55}, {&(0x7f00000005c0)="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", 0xd82}], 0x3}, 0x0) 19:51:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001e000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:46 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x2000, 0x0) 19:51:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000002400)={{0x2, 0x0, 0x80}, "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", "204b9e1804d636301150775298e6490040d0ecb72371cfe0ccc258d2b4450458b909ff0100000000000037ed25df0ce2b046ccc47e3501ed7a53e69d95dfb761f3fb81659983876f915b21b4b91270b4607875b751136514bb42b1de575e5ae05e98fd37dde49acb6a8e7f7c592ceb8793d00c84515e9b091fca8056f69ef47c1c91735af04b3077a94a24147489c6bbc3d63a76ba4eb1e6adf014106f4b0117fc6a2b2c84ca9e6c40fade373fd49f657e5e828399868d39d2a9d8cb3f4508e156d31ded826a64d84b19ceb0c13d9566f14866028f00408428bc6b9a27761fb13e70561fa8bb45bf2547baeebd7c99e01c1ebdac09ba75e3f67b2bc6898ca2c8e6c2b09efef1e688c74fe8e214b657d3325725531f9ce71d59532adc69f40e0b821fbd14558133f9fcd9d5ace9150703b5879f74028583dccd4984a9fedf23f1f6b8c501f9a99762079404f109e6d69b0200000000169e44f186eb60e7abf9539cb8013670435420f54b7e485644f5afc2d0581d8404c23bcf2c0bcd6d3a6fbc658721e74546ea52d57f259e841e87f01ace9d7fb10bb4306abffa306d91963914bc144e486f78c048aafe20eae27ff53250de7bed8c4167780c53facfd741b93f53d67a60eba1527701896bcd29a6cc20b9390582421eb0e5dce7a66a94881904dd91c47c59e8b7219adae86ba78b230306829368a56dc908245fc72886c3b18facea659b27466d3c6a85b541f20a012660319f8f4ba0faf0d83d28ac63ae417323a0f75b88235d1a60a29c41f662b34ac40ac19c94f227567860a998f5e4d8f65b930c1a1209ba04cc2406599914e8ed7c98d8095a56fd29920c47c6221bf7e6a076dfc90947af9468d8844731ac3923896f25a8402521e24e1d328e5b9daeb97048b87e3d374874071931ad791c1f03324ba01d463364a5bb1dba7e3b807aec9c333703397a45918c73b443dd46f7b289736662ad833302fa89567e44c3de8e2f87bb5f8758abf6f888ad26bb5ed48a4bd828d8fcf5c01cf7588009c1a6c35e94142950b3bac8fa0af15c2f30504cef3e544b132e4096a836aa49336cbe878d2e33075d0712adc3e75b9f9bc7ec420f123084eb296119171535c4fa49d460d4444eb309f424ec13be89ff6641caa089da262ff89c0d4b1a86fac91361a7a124a0e4b27de253186e10671d2532d600f6b4089dc690f600363092ad93fb62fbab9e1a96caefe31e4c117420fd1df64e4e0cf4967cb026a003be444278553c2e58e19ec5a6db3921fab8fa0748965e523659e54a3e01190492f9b01811d06b13d8c833454ab5a93af8a9ad27a155d682d8c78f074da17d6ccb7ded5b5f3c30e3afb3c0e4aab6ce79e00d42df9a74f486aee74c0bc021c209000000f5e79678c45bac331d6ec24ecb404296dc9e90b2c191fc14c53505e92587f43a5eedc56a6408048d9dbb8bee8840a656952cb361f0d76baa20939e6e8ab917e12b76dd812b95e68c90708d7cd81aa18002eea116f4190e49d1f628a509c8fb65f393ef5bcf7d1b9ea289e0532ee5f46e65709e84aaa7a6334c58eaab5c3cced88fa3e9e365ace119a3c40dfe336abbe6d3a09dfd895cdc3daae26ae9d3f68a3a2184ac5f6972ef034f1f9f0d4100a55b8638db0986f362a23b599903909a5a6193fc2c6e54adc965ff5d48bc1ed1b6ff0ab226b9598f70a13ca0a0b2d2cc05f17449bd4cbd224fa75810955011d5a401348c0b75546c1fd86824ced7b0c79cb4d13a3722aef6f7a0cb49f76a372ff133736f04b67bf6a74d5164a227f4865dfd15181e0a9e5dc53317ffb04a7ab1fba87d3b34bd1cee7c6aef4b3ebef183c9fcd4daf091ef1f5f2709a7eb4a648242c408e7d5b10b766e0f648c2189c4956474892e379a84b1f09f13ba589423e43b4b0dd267b1d0c976fb64903ea2d22e2612d9dbad91536a986f44986d74578f2cf378dc6505cc26261548a080e11d74fed2cdaa90479f0656fd927f89a0624f4ce943981ffbec2ceb27c7fb6e6ee7df7c2d26d7151f1dadb172a0017787c5d32d6408b6662c8f5348f34e63649206142164f7aa076b2c83bfffe44126ee923f0b9bc917e52308373553cf19e6798ac83ace350be47f445ef0d268c2a4fc67998a5907db42decc63fcfc30df0a4543da178e442aec97060edc209e34849f6beea0e366eccc80b87c1c16f89e5608b96c176ccfaf6014a619b81d72c5a89749cf763fd76c6ae82b6a1322674838ab9e5f9a0db7aa8b7d27db308edb664fc0197756f6709df36d9f6ed678944e18455a8d49434f9a6f223cbf52b6a1ba266a55331ffe7e83fb4130c2f5558626c4e451d8bac1da046dd59249fe41b6c8a36e82346918e0177c876f44101ff9f7721d8fbe1eca04e13ba8db3f5bd01c3661df0d6c8a24d45a246e0ac80aed4178901a71a939da4622592b3a8d87b3ae35370530039d7d413455e9d61656b58a1e63aa9bf1a87d8bcc6605c3167836f82ba01f54934e2d31d7463e1848ee8a2cca55a029d5ed37236dda9f278981cdb330eabc6bfc33a7fee5678c38b8e0a9258fa8ce5cb8abc3320d44dd16098df1bbf9d3e3142ec1838ba81785e37dc97fda2797e3cf6b7d6c367737b4df96a242149bbba7af54da91b404fbf01f4ecfb7ebd97c67de2415b3bca3b5f21deae988733dcb547a17aa38c0b98aba60fbb1d57f9e8f005ae6233e5da68da32c7a2778944a2eacba03e3312fe968fa3be0e2ceb4d8526803e7a8f24618b1003860e424da518c9602cb092c9c6b930b72523abf615ad8330e337e64ff82eb78d9a2384e86afece8aa9d9cb1b7ab27265261a3cf542e1655792ed66b28d27bf4f02d13e93413bfc5fae7dbec15aac85331ae3d4032679988ffd1c1750447f763ebc9ba8f8ba4521b74563af6ee8a996af3707dd03118c3f0d18d612a5105519310f7b8c5eb4b7e3a0d675374da18314d14415d5d0ba2735dab4efdf68f78285ce4d35032427e23fe7c59c5844879550417dc93d2221fe0ff82c7e21ebba19c01fefc6f6eeb7078e7557f077ca089246e6f3901e127ca4685c191847ae720ce30d41939239b2835d9cfd126faabc88eb80d409d8ec1cdf6070c55109bdbbb668fd56c6ebd3503986cdf5ade19903a85516f0ed87872f397e6244b0f58c70b8dd0cbc408dd7a87c42d672d31fde7fbc31b3acff4be744b933ec0645f76b52481ba6f50a25a98f89d9989e347b682a459eb38004d0de0a7314f8319b1e0ce5152a4928d7f59769347a7f48af595d028b5012cf5b7fc081cbec3c5ad30801947b5d3f87a242b05691ef3f46f0ba35fa6ee28a966ad42e34ef6192cb6e5de41411df4638c825688abc1c8f1fa7b2eced5ae40a5d35d7cfd981f4dd46a91e8f123187d8e05a947020cdc4cfcb66ee004232ed5badfa694fd943ed59f01433989e5663a77fd2bbcdbfaad5ab4ae9e99134b320c04444c3d5d71e37c6d4faf82b1297d75a520e6e6c5a0d7ab9fe83621702ef3507690f50e9abd452da33c58974cb63e4711fece83cf1251c6eecc7c9a887b0a881f148b6c8fa3749ef09661488909a2f74e41a4968f5f1d1ebd9a511f5732ed60a18032d68dcf34a5914b1c24275e6c3d331a8c454e4c615db1f6ce4de1b44fc755da73eef517bca08fa464443eabf4046961625ee82c406e08359b49785a1cbe9822cada3375da9adf55bd50e156a314f10107a3fb880a944fa3a0cdb4be2234c19ab26f8075c6389a0a6062e82050b493a30e617f728b8d0ced0b69da60c6fdadd95ee1c0e656b63ecc72a491e07bce4c3df3761e51bb327a86d55a375e4f5859a8b179a47f4b5b8b85fed0db916e31885d0ad185d6c7e79449e282a5d10a7cf86d0305a2673cd9aa834d130fcb1098c0f69771ae23e2b49cdd3d39be17fcc309a282486bf0e0829a0805a036b0b1e357f03a861857312dab3033f00957ff6f03a35240724bc6adf429090f555aca563ffb5e4b67c75486149f2495971bf653617f29e50d59da32288afeabc768787d2e830c70d5f0dbd8db5e9923b8893f32c4cdc0d8130caefade59d7f5e270f8b5487b69815dd8cec6d3dfa3ca308987f2970ab3e8714cdbae27dc22fa434805c9284b904840a92bc76490c15c6a04df137940d48f7ac6285f858611376f447ebaf11ce4014066d57e5fa579b588e0d795fb0322d1b8606faf9507092be3e320184a5324df47792e8b015ee27ace73b0bc05f3eff2c2a9ee45752df32a85b1ad5679aedbe40ac59511938929e210a409e538c139d1fb93891d2b9908f915b9c556788bb8926b6a96923038a119eb68bcb528a42e97f8fbd49e7d5bb3e51987cca590ea8a18e049f64d8c994d63a707c441e63509f909adf5f7c26d36714bd55607513003f8f85f20c8fea4248627d2f19891baef9b134a8ecb6e3da6232c5b818d7469645038312b6b952f782f28ccd199367a51f750927e5f11ef04cb299dc7ba0c24500134d3a9a0a4f62903ae930f5ba49c39855ffc4aba6cc9d400075f094875db9ebcbcbb35309421d08a928b0216dcbbf718761b01b4d41cf55b0b2bf4c89603a61e5ac2f5bf5236d4bee90617e1b2fd6013546e654e36fa328097ce8a4baf5a2fd78f9bca617bd4de062dbbc38c7356232b385823b6c604a401f43f5864111eff29045c12b6c622182e097caa5a9945133375b46dc0e268e860dd58b62403c41393f02c7f1d23a1d0daad5d2eb7a085387ea6b81ceb6191d5ffa7f58848996caad4796ee8d9e1bad072455a37d8b64888cb4007f344783afca22db07a2ccb8531c6a9ec9bffdf1f949e3fce89f623119595c5b9bfa51893ff36849be61ff0103edeb00c0f763bd4251805ec8d894692cd1636b4b1c96ab613896c17b2fb8a414a91463d54f145e1d49378e726e5921d8cd34aeb176a36701c9b978b08e4efcf402d4345034d7fd5165857bd2cd07b32a18334a3cf358dadbc8144b806120805a07714d8d0029fe0db7958bbb69b9a216e5945fdf0b892665c0bad2cd822797d5c7223094cd54042c781fba9d7f05a169f390225385d5c055896dc8a620a637a7c73ee77fbf2152fb62af9bcbe01389dd846724fa24ca6088d2bddf9bcae4d9e11f86266e4d87f6b11f3721c30c3f48ddfecb7623802c7e3f595b088473746d25b70bbdf8920924c6bb9e202e6d54e340a469e8ecf66b49dda0036a7d071492742593c2e02bd7bd703774f2ac8c45dbfa1f8ce4c205a05064362bf2819e80bd406367a86ece3f5d54b43029b3f7fcc2378c5e33e8de66fa5f3c4974310c3ac4d2ab1234b1fea14d71512c578dfab154a74dc66c8a5ff983a41e02c57c58cd9c3a77d22f15f8a6abe41de51ce4a921591ebba872c4feb0453b4f86fb4c7e19063b871ff6458b2ad51b992df6b16de3a5a2f5935c85d5a8709d82943c645f6199e76b38d718b86945638d92daa15aeb9beaa53028a425c6ee90dbf58b57f4a748ec0037fca725812aaac8e201d5121c06c9d3bfcbe799b9fa28440fceec7885d39a112626bd0f9e530cb5573083e6b3b0ce5ef60e85ea643331d45663f309d75d36c88ed56abbac74672daa72c2f180ab5d117d2ab17db9e36a807bcaa62a07aa5486d39d63f64d23f03e58f6fa346b39005cde05121ecc2146ae982d02532a2deb90d8b9cfd32ff03a5294933292fb3d58760bc81a72df0e602b9b4b7e407bc542924e9763fe0d4bd5346ccb9e10b1ea7dade31d4bbc900"}) 19:51:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)}, {&(0x7f0000000440)="8f498bd75a3ba5bf26fa47dbf9dd968f6ab5fefaab7a6630d3bd1974ae1608796ead3a2a5b08dd2237479d855c0a37629bd4f5800f997b41b1490813cc06ef8bb516bc2fa2ed50f1975bf3dc9a9dbd3e167fc9d1cd40628106fff12c519a1f7617350a136e561f5ca5af729bfa8441746b587716d22c72f7434847846455a17b273ca6e8e67184e2451d0ecdb610f0feda67828b65eb40c939a60ce8b43c179997e0d7ada7a7b55dcd2d27588def6fce53c1e7b65081ef0a2df00562bdc6b24c5bf06c7cedc3243424f349e898718cec6eb4c895df3b9552ab9c4ae57e7b8c06017d9a707e52de215b62", 0xea}, {&(0x7f0000000540)="b36c52f91c3368e8b47bce8d2da128e18829ed6af36d913a4d80feef1bc80af75ba51aee78b8485e957ce30753342094e34fea342e9b122b38a6e68d55ec76ec12eadd44d1daa99dcef3f09f850914e536eda80018", 0x55}, {&(0x7f00000005c0)="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", 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) 19:51:46 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0x0, &(0x7f0000000000)={[{@huge_never}]}) [ 1093.773480] bridge0: port 12(team0) entered blocking state [ 1093.779160] bridge0: port 12(team0) entered disabled state [ 1093.787412] device team0 entered promiscuous mode [ 1093.792826] device team_slave_0 entered promiscuous mode 19:51:46 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v3={0x3000000, [], 0xee01}, 0x18, 0x0) 19:51:46 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0x0, &(0x7f0000000000)={[{@gid}]}) 19:51:46 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0x0, &(0x7f0000000480)={[{@size={'size', 0x3d, [0x50]}}]}) 19:51:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="c9", 0x1}], 0x1}, 0x404c0c0) 19:51:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x40000003}]}) [ 1093.902796] device team0 left promiscuous mode [ 1093.913063] device team_slave_0 left promiscuous mode [ 1093.941551] bridge0: port 12(team0) entered disabled state 19:51:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="c9", 0x1}], 0x1, &(0x7f0000001880)=[{0x28, 0x0, 0x0, "4bc4256252a8c83720dd312dcb39605150"}], 0x28}, 0x404c0c0) [ 1094.007001] 8021q: adding VLAN 0 to HW filter on device team0 [ 1094.034935] device team0 entered promiscuous mode [ 1094.049733] device team_slave_0 entered promiscuous mode 19:51:46 executing program 5: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) [ 1094.085724] bond0: Enslaving team0 as an active interface with an up link [ 1094.155507] bond0: Releasing backup interface team0 [ 1094.168010] device team0 left promiscuous mode [ 1094.185261] device team_slave_0 left promiscuous mode 19:51:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001f000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:47 executing program 2: syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.selinux\x00', &(0x7f0000000100)='9p\x00', 0x3, 0x0) 19:51:47 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_matches\x00') 19:51:47 executing program 4: mount$cgroup2(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0x0, 0x0) 19:51:47 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0xc0ed0000, 0x0) 19:51:47 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000004c0)=@filename='./file0\x00', &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='udf\x00', 0x0, 0x0) [ 1094.340855] bridge0: port 12(team0) entered blocking state [ 1094.346795] bridge0: port 12(team0) entered disabled state [ 1094.354676] device team0 entered promiscuous mode [ 1094.359663] device team_slave_0 entered promiscuous mode 19:51:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)="eda2506285b3fee8c6c60b6b03dc0cc3e120246d2396b26c6d093ca226a6dda2522c79dc7f141ebcc433789f08e77946117a6ea3923779022fa7c535e971e8d44afa119f", 0x44}, {&(0x7f0000000440)="8f498bd75a3ba5bf26fa47dbf9dd968f6ab5fefaab7a6630d3bd1974ae1608796ead3a2a5b08dd2237479d855c0a37629bd4f5800f997b41b1490813cc06ef8bb516bc2fa2ed50f1975bf3dc9a9dbd3e167fc9d1cd40628106fff12c519a1f7617350a136e561f5ca5af729bfa8441746b587716d22c72f7434847846455a17b273ca6e8e67184e2451d0ecdb610f0feda67828b65eb40c939a60ce8b43c179997e0d7ada7a7b55dcd2d27588def6fce53c1e7b65081ef0a2df00562bdc6b24c5bf06c7cedc3243424f349e898718cec6eb4c895df3b9552ab9c4ae5", 0xdc}, {&(0x7f0000000540)="b36c52f91c3368e8b47bce8d2da128e18829ed6af36d913a4d80feef1bc80af75ba51aee78b8485e957ce30753342094e34fea342e9b122b38a6e68d55ec76ec12eadd44d1daa99dcef3f09f850914e536eda80018", 0x55}, {&(0x7f00000005c0)="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", 0xd4c}], 0x4}, 0x0) 19:51:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0xcd}]}) [ 1094.470421] device team0 left promiscuous mode [ 1094.486701] device team_slave_0 left promiscuous mode [ 1094.493724] bridge0: port 12(team0) entered disabled state [ 1094.507569] 8021q: adding VLAN 0 to HW filter on device team0 19:51:47 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0x1000000, 0x0) 19:51:47 executing program 1: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x3d6e4d11c1788bae) 19:51:47 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0x3, 0x0) [ 1094.525479] device team0 entered promiscuous mode [ 1094.538917] device team_slave_0 entered promiscuous mode [ 1094.565024] bond0: Enslaving team0 as an active interface with an up link 19:51:47 executing program 3: syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$squashfs(0x0, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='./file0\x00') [ 1094.612108] bond0: Releasing backup interface team0 [ 1094.620792] device team0 left promiscuous mode [ 1094.639525] device team_slave_0 left promiscuous mode 19:51:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440020000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:47 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0xc0ed0000, &(0x7f0000000480)) 19:51:47 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x24002, 0x0) 19:51:47 executing program 1: syz_open_dev$vcsn(&(0x7f0000000080), 0x0, 0xe4041) 19:51:47 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0x0, &(0x7f0000000480)={[{@size={'size', 0x3d, [0x47]}}]}) 19:51:47 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x400) [ 1094.874159] bridge0: port 12(team0) entered blocking state [ 1094.879906] bridge0: port 12(team0) entered disabled state [ 1094.886941] device team0 entered promiscuous mode [ 1094.891901] device team_slave_0 entered promiscuous mode 19:51:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=@deltfilter={0x24, 0x2d, 0x1}, 0x24}}, 0x0) 19:51:47 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000340), 0x24, 0x0) 19:51:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {&(0x7f0000000340)='`', 0x1}], 0x3}, 0x0) 19:51:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002180)={&(0x7f0000000240), 0xc, &(0x7f0000002140)={&(0x7f0000000280)=@newtaction={0xec4, 0x30, 0x0, 0x0, 0x0, {}, [{0x248, 0x1, [@m_bpf={0xac, 0x0, 0x0, 0x0, {{0x8}, {0x1c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}]}, {0x69, 0x6, "21f150360dc033a7b6e26257483f4f4944a554baa653ac9a6db390e1aaa12e719f6ee7405c65326a2fce76f72b40bbd2a42d6412d785864c865acfbaef2ce24f4c9a6afac168db6f72ddb65b644829b906e442445723a3f40480c03393a2cccd548290fb12"}, {0xc}, {0xc}}}, @m_tunnel_key={0xd0, 0x0, 0x0, 0x0, {{0xf}, {0x44, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @mcast1}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @dev}}]}, {0x5d, 0x6, "f2a72777d6cdca1d03d274b46cdd3a6778c62dba83b3c47c68f4b18bd17f5bdb33d69ca76dc4a1ff0aa677acedb80c937f2e91f1143d049ceb60798bc8aeb9dd94e6e029588fa373ecb6c90eb94f70ffec661404d2d8b47219"}, {0xc}, {0xc}}}, @m_tunnel_key={0xc8, 0x0, 0x0, 0x0, {{0xf}, {0x3c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @dev}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x5d, 0x6, "ca71f272ea9fe2a3c8719bc2f104f9f85cb45a6cd10383a095a058581354e944c485bfb5e21d5229677857646ef316855b1105caf848f61583f14a8c98ed602b02568f62cbecb028e9a46324b82beb03cd89b890a590ccdddf"}, {0xc}, {0xc}}}]}, {0xc68, 0x1, [@m_police={0x8f4, 0x0, 0x0, 0x0, {{0xb}, {0x868, 0x2, 0x0, 0x1, [[@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_PEAKRATE64={0xc}, @TCA_POLICE_RATE64={0xc}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xeda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7]}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}, @TCA_POLICE_TBF={0x3c}]]}, {0x61, 0x6, "ff0449630218da5eb6565aeef93a979700faee050c41a605bbb994ce503145d8cdbb617e76267503350516fa2462495a5532cafbe34ee6acbe5184e0386ebc41731f2af3a697fa1c8de61ac74d4ebf348aba09f00c23d950efc6ce832d"}, {0xc}, {0xc}}}, @m_bpf={0x10c, 0x0, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{}, {}]}]}, {0xc5, 0x6, "8c56a70e5597c3ae5511a78822a933fff117f369af37fe43089b818f0d360101e9fa600b0f82812be975b0c54dff85990a85aadca1a05113eb1bbe60086af660b31c59f900ad4b5babf60b65ef3a430665f9e3af5727e443ea0afeeb712e077507f7de7b6eb28db11bc546f26c85e2a286e9cea11d7420386dedc0926a14df60bf71b668a0af1fcb76d5e85a6ec1a3dfdf847bfbf35646b6f66768986ce9cd8ab96e0f6f327bb5a81668b0005e72e7a8e6c87f097b2d8f854c0a32cb67aadb5610"}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}, @m_gact={0x264, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x235, 0x6, "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"}, {0xc}, {0xc}}}]}]}, 0xec4}}, 0x0) 19:51:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x4b564d05}]}) [ 1094.988488] device team0 left promiscuous mode [ 1094.994094] device team_slave_0 left promiscuous mode [ 1095.023287] bridge0: port 12(team0) entered disabled state [ 1095.071497] 8021q: adding VLAN 0 to HW filter on device team0 [ 1095.078325] device team0 entered promiscuous mode 19:51:48 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x1c3482, 0x0) [ 1095.112190] device team_slave_0 entered promiscuous mode [ 1095.146807] bond0: Enslaving team0 as an active interface with an up link [ 1095.192701] bond0: Releasing backup interface team0 [ 1095.198288] device team0 left promiscuous mode [ 1095.229430] device team_slave_0 left promiscuous mode 19:51:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440021000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:48 executing program 3: syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x410000) 19:51:48 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0/file0\x00') 19:51:48 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=@random={'user.', '@:\x00'}, 0x0, 0x0, 0x0) 19:51:48 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000440)) 19:51:48 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0x0, &(0x7f0000000480)={[{@size={'size', 0x3d, [0x4d]}}]}) [ 1095.387207] bridge0: port 12(team0) entered blocking state [ 1095.392974] bridge0: port 12(team0) entered disabled state [ 1095.399368] device team0 entered promiscuous mode [ 1095.404358] device team_slave_0 entered promiscuous mode 19:51:48 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r0, &(0x7f00000000c0)={0xb}, 0xb) 19:51:48 executing program 5: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrusage(0x1, &(0x7f0000000080)) [ 1095.509860] validate_nla: 8 callbacks suppressed [ 1095.509871] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[{0x10}], 0x10}, 0x0) 19:51:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae8a, &(0x7f0000000240)={0x600, 0x0, [{}]}) 19:51:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth1_virt_wifi\x00', &(0x7f00000000c0)=@ethtool_pauseparam={0x12}}) [ 1095.569643] device team0 left promiscuous mode [ 1095.594087] device team_slave_0 left promiscuous mode [ 1095.615164] bridge0: port 12(team0) entered disabled state 19:51:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x40000108}]}) [ 1095.657843] 8021q: adding VLAN 0 to HW filter on device team0 [ 1095.688475] device team0 entered promiscuous mode [ 1095.733254] device team_slave_0 entered promiscuous mode [ 1095.759297] bond0: Enslaving team0 as an active interface with an up link [ 1095.776837] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1095.794529] bond0: Releasing backup interface team0 [ 1095.801862] device team0 left promiscuous mode [ 1095.806781] device team_slave_0 left promiscuous mode 19:51:48 executing program 2: syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='./file0\x00') 19:51:48 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x2000c, &(0x7f0000000080)) 19:51:48 executing program 4: syz_mount_image$fuse(&(0x7f00000005c0), &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=0x0]) 19:51:48 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x1ffff000, 0x1, 0x11, r0, 0x0) 19:51:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440025000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:48 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0x0, &(0x7f0000000480)={[{@size={'size', 0x3d, [0x30]}}]}) [ 1095.955863] bridge0: port 12(team0) entered blocking state [ 1095.961682] bridge0: port 12(team0) entered disabled state [ 1095.968004] device team0 entered promiscuous mode [ 1095.972950] device team_slave_0 entered promiscuous mode 19:51:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth1_virt_wifi\x00', &(0x7f00000000c0)=@ethtool_pauseparam}) 19:51:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000100)='X', 0x1}], 0x2}, 0x0) 19:51:48 executing program 4: syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='user.incfs.id\x00', 0x0, 0x0) 19:51:48 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000600)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000380), 0x0, &(0x7f0000000480)={[{@size={'size', 0x3d, [0x45]}}]}) 19:51:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) [ 1096.100429] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1096.160311] device team0 left promiscuous mode [ 1096.182378] device team_slave_0 left promiscuous mode 19:51:49 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000500)='./file0\x00', r0, 0xee00) 19:51:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) [ 1096.210300] bridge0: port 12(team0) entered disabled state [ 1096.245202] 8021q: adding VLAN 0 to HW filter on device team0 19:51:49 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x8000}) 19:51:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e80)={0x8, 0x3, &(0x7f0000000d40)=@framed, &(0x7f0000000dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1096.285256] device team0 entered promiscuous mode [ 1096.303154] device team_slave_0 entered promiscuous mode [ 1096.332124] bond0: Enslaving team0 as an active interface with an up link [ 1096.365242] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)="ae", 0x1}], 0x1}, 0x0) [ 1096.381568] bond0: Releasing backup interface team0 [ 1096.417013] device team0 left promiscuous mode [ 1096.440836] device team_slave_0 left promiscuous mode 19:51:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440002000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)="aeb9dd02aa511d6f5c0512fb4a093963617b3641cfe28e6628c991d75321b8dccca546716611e14844c445e29ebb55f5a7caf9b8444b458a7286c8868ea8ab29750a16a1d3adc610323ea1621a6ecaa9835a715f7bd6142703670605a2f3a09e1d17fcf5e759aecb551f8ba5d7922a3f7595574b035e3f0511be9432af4518b7917f6bd511d7cb8bde65a022c40be3181e4446668321455735cddd37dc0834b80f14", 0xa2}, {&(0x7f0000000100)="5875f518adc9f8c2c40a95e317855882f3cac9576e900d5617158034dadf67d70aa557c9cd32d351a360b5981be30c9a68ec09987d902488adbb83d90ce2fbe808b00113139d4b621b5072a32801cbea9c4b5d363c4591f946e21ba3e10e907fe761832060c357df", 0x68}, {&(0x7f0000000180)="cbb5d3254806118ee557e061dff37d04e781e2f06223abe83fd07844db093b835ed2dc677538fb4a1c4ae3ace7d7ea05618062ecb3419a119fc1aaafbdc675a2f6c84d9454e582fc4e83261efc7c3a33d760c9a32762a41a569181fbe67df001b9be0a55758278c3dc353e164de8c80ae2b6900f8591", 0x76}, {&(0x7f0000000200)="fb744584ba568005e9907973d1df83698cf584c2201a55139f5b4b0f7feaa077ff23313cc14ea7a3c137b09df3e0533242cea3756d6f231a0db42758f73cb496ea", 0x41}, {&(0x7f0000000340)="6030ee23e3060340b2042d1607ed51e36533fac05e5b2ab00bcca48ab2e8b2815d6b64236919728675dea120a08413d1d65ba3d7bbc743bb707397605c73152bde3e0c0a0354edb2cf8835c3c4c27c027c86ebd0f2ad502438f90ee8fbfac236ba68486b66dec07dd735917daba9722e1383704a81d95caf3e8f79927b070436d6ee47db4de9340b18db9c050c4b4d5e76a4774d47e5bdf15af87d4757bd897f77b27c03baef2fcbf0f37c6e774a5ec86450c6db94", 0xb5}, {&(0x7f0000000280)="fa84f8eba41eff8a8089c8c9dc4b7cc3a3d197b1eaa79dba8fd0f753b3b0a0ac", 0x20}, {&(0x7f0000000400)="9dd7579f071d927ad1e9b4824f7685ef436a9fc14f54be438ffd6f0306bd7e852ac46d0d190ac5bb26784db938178b6e63dc03a91134cc06fffaae91e2a65227f122", 0x42}], 0x7, &(0x7f00000013c0)=[{0xf8, 0x0, 0x0, "038192e7a1c296dcb9cf7bde831132b1d663e5ab19f7e85cb325cb85919a290080ed7871f44a062902153aa28d0766015c87662577151d60928538dfb6e9a1c81d9795b67e9c439d64307417dfd4907581f499fbd1a9a78627984c4cc41afa9bc6b6d80c004a19f19128e9dd681b6c9cfbfdc9632bf881ed6f2d206c2ec402e8ddd528b99c7dfd7c99fee5aa515377d8334ce7bb256804e7ae99b7fbcf451b45a043ce5005d77586eb492bc9ffbe5eb470585c9965642f32c6c0a14804862eafc1c6c4f5531b42506adb9a8cdbe5f391db81c5665ecca4c941bc53d9a5411d0b674e35a7249e288f"}, {0x80, 0x0, 0x0, "d821876467b5d2ef90742263c229bcb3e7a6ac26897cbf39d92db331491e6002a4c42363103e7f7b072c7c77f185e31931882087670c77c0daf2de88d6de976be0f827557af54de51b3ee2400b93186374b709dd481820f0e0638fc2b54653d0804838db08a7c0cd49e6"}, {0x27, 0x0, 0x0, "044b5de3608f07348e92fb222aee38df8925fb957cd79038a4a25fc0bf4666a77e6cbd62da719067bd11d0d9d0ebf057e645e7ffdca62829890856def55aea39ec7432307314ab0dd495d81c4ad387dbc5bc61383260d41899fbba7ca4aaf7dc09a77f0ea55f395f7facf719834e75cbcebe5424cac957cbd96fff53cb232ec21d6ba4d5155ff99fc616f60b6c3431a527f159330e958d0d93e1ecb71276dc17345f08859f3120d5"}, {0x1010, 0x0, 0x0, "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"}], 0x1240}, 0x4048084) 19:51:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001940)=[{0x0}, {&(0x7f0000000440)="8f", 0x1}], 0x2, &(0x7f0000001a00)=[{0x10}], 0x10}, 0x0) 19:51:49 executing program 3: syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0), &(0x7f0000000a00), 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x0) 19:51:49 executing program 1: syz_mount_image$hfsplus(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lchown(&(0x7f0000000500)='./file0\x00', 0x0, 0xee00) 19:51:49 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) recvmmsg(r0, &(0x7f0000004180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1096.611557] bridge0: port 12(team0) entered blocking state [ 1096.617320] bridge0: port 12(team0) entered disabled state [ 1096.624935] device team0 entered promiscuous mode [ 1096.629886] device team_slave_0 entered promiscuous mode 19:51:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000380)="b9800000c03500400000665c8239fbc4237d0923062e35c5e17de74bc402793350f8f800c4635765f766400fc774a666baf80cb8623a8480ef66bafc0cc422a58c010fbcf726660f38807769653626400fc7bb00000000360f7955f49af342d8868680000049b8206bc3c3220d2d4f5d2e66420fc73366bab6203e65650f06", 0x7f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000002400)={{0x0, 0x0, 0x80, {0x3000}}, "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", "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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1096.708649] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1096.719633] device team0 left promiscuous mode [ 1096.732668] device team_slave_0 left promiscuous mode [ 1096.740557] bridge0: port 12(team0) entered disabled state 19:51:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000340)="eda2506285b3fee8c6c60b6b03dc0cc3e120246d2396b26c6d093ca226a6dda2522c79dc7f141ebcc433789f08e77946117a6ea3923779022fa7c535e971e8d44afa119f", 0x44}, {&(0x7f0000000440)="8f498bd75a3ba5bf26fa47dbf9dd968f6ab5fefaab7a6630d3bd1974ae1608796ead3a2a5b08dd2237479d855c0a37629bd4f5800f997b41b1490813cc06ef8bb516bc2fa2ed50f1975bf3dc9a9dbd3e167fc9d1cd40628106fff12c519a1f7617350a136e561f5ca5af729bfa8441746b587716d22c72f7434847846455a17b273ca6e8e67184e2451d0ecdb610f0feda67828b65eb40c939a60ce8b43c179997e0d7ada7a7b55dcd2d27588def6fce53c1e7b65081ef0a2df00562bdc6b24c5bf06c7cedc3243424f349e898718cec6eb4c895df3b9552ab9c4ae57e7b8c06017d9a707e52de215b62", 0xea}, {&(0x7f0000000540)="b36c52f91c3368e8b47bce8d2da128e18829ed6af36d913a4d80feef1bc80af75ba51aee78b8485e957ce30753342094e34fea342e9b122b38a6e68d55ec76ec12eadd44d1daa99dcef3f09f850914e536eda80018", 0x55}, {&(0x7f00000005c0)="a6475056567f1873136ecc61fbc7537b7105d2c09f46c26fa81629f3de2ca798494d24c0d2febf58ced5420b1d370d32126dc5981d48eb61f96cefd1c139b5daf982ad76dde2089df56c5fa7a0b587bf92185e06396a142b5f02cd22860cd52078cde3554b571a5eb5282efbefcb1731f85537733e9254ee05e1b1847da88e5b1cdb9128fa82ea9b922b3c142b1df4c3989bd80e0091393280c29e714d6020b32cbc185fb94c029914a087c873974966d9396a499946a45560050545b584364ade827511df9cce2d3e144f9253771d25fac1c4ec916c2b90aa5a8de1b483244c3ba240c52877a1432a96bc583e6a3e39d1164939b9cec9f60030a6a2784a79b2844739021af4aca61cb0efd8a8dd8008d48f1c9b50671e2885fefd15ecd3228f21312bcc077a40a0053780dff1d9d822fe7921e1da46acd5604743ef454792151035a40c35a3a5f6995c07c3c741494e553a33f67ff1ae0e8c81217663cf57741084afb9f91504b2e89e194deb57d91583fad3e34778a8b57d2b40640603396d5154fae7e6da8dd82f7a4c0afc937abbcd141ed96f7fe73f3c0e5378bb130365487ae0f61ccd484a227f9c06f4d8c60bf4f6f6be6ba2003fb0ae38689f213ff01c36079870f2d493c52e59c72c6bd4b739e8af6617425a95df8b6f3fffcf64e0492ee5b8367a059c1c96c842aa4a6260e18d4ddc0f0ef51cd031983af2aee99018f372ab25d5247d62532ac3d6e0322e2d53d567a442d535cf091ae3453a17ce89d37e38645b5f7acea0ec75ce3531b70b04397f00280f24eff06caf7a040411c8e50776ce5033bfbf3e8c15caefe4610801d429164a88dce3415d1f0ee7a4f096a6908a769764c17c59e21d3eb74ac979e2444f00bc85adc91291f77a92ef2363a7baa5e106d0778ac0365e9c13364cda16ed1830d13b87441f4c0e44b26d733d7b8bfbbc771dddab9cb5f32d42d2967da6801a6131f8a74df0a12312c9f93ed9d74b41168600b667dfa92733b653374554aa452bc5e0da7476b2d66fbbc7f192cb10aae902ddedc01ca09a5df393fc7c223de54a6fac855fba0815a3cbfd8f1cf9ec062812a70abd57f90cd13c15c2ca833c0bf2c92b84826898df470d2b11b1a264b503726f13491e9c6e5a625f128f4ebf10a58feb0ad55c82a1f8f2816c5a4cc961f7a26c3abaac48ab19b93ed627121ec045974634ef65e1056044a169a84203ee1ec2f1a48cd31906fc8fef787fb341e1f295bfeabf7a6ecff060466cfaa5af4cca405c8ae54af183d052b5ee9d848994ec8ddb31bfceb07ca52e2946817f2323bbd6c8d4e44ce2134f8d01c3ae71720aec6a86aa5ecd1218c285b7e31a2d607a2f65e3e145663e8c7aebde7d39acba92babf3b7ee1a843b02a6c24a58c403b9020b99d1054c081af6ae9779506b1a57f29d04119fb13945bae6058db775c1959b292bacf04fcc0fcee69d6f18512b858a8295157b8f5c0992e112c31f9d11badfdc65cf0b2dc2fc54b1cc464f961097cf75d074f9fb95e9b3dbf42a9407506f58baa2c07a09e9e2ceb5b5263f9a728d96fecbf3c6b53e63b5a034957ca99bd43966915a9871a28b7e69273cebc7ea9a730f3f7c0aea7b75f41145e784cfeeca53c51108e8aacef3d05221852703324b074d9654c7a52f96c88d5637ed3a4fb57e4204d9a704ce37a6b8a90314856a9396d43b2ab16416cf1faf47d97693efbe9a1512c030341ea50d00d4e30c65f7c6037b413acf3d75eb81f6a0e4125f3529b998a36c63e1806dfc460b9febb79586b625c40e22fa1cfc561d85db41091ad61f747adedb6b107c29e81f6d682f7767a8bab3a07c0a61fd2c5e8a8b0c8d154cedea9e0b937621cf34f81487286a3174772dea0d16765b39e81120e57300a0bf27ed54ac86b3f53bc8ed0bbbfcc7d5a5165382f8bc2a9b341f7e8ea6f5ce6ae51ec17f77c94645fb8776fc614da06a5af0dc2ed971120f970c511a324712133ac1aa00741df4b1511c1a126edc70b0e9135275be5ea0c4de82f868f729e3a951b52e01320f8c3fd1325c6ac8b90f16440ef2b543d00515143bf0cf438734b44c7fc5fe83f7f30486981ea6dfd4bab1fee7e613bec7d7111dbb1167948d675ab46a1943ff8f6e45b2e0bd558abc6ae883e2974bcf695ee95ac0eeda73b7ddf9d13412a30252f12b41e53629b0b25839c9acc7df10cbac8c9c94755641103e272a6df6e8c806dfe339abea465e15c82640e8d1a27c2617a1247607326d5b2c134370010eef592e8141d88f8a81508d58a35c2c0ee46dc009a021ce7ac331be5d70de41f07348782a5a2aaceda7081153e577b3e6faf7154fd8dc9a3a1bfe5f6b4a2766ab2a07440e5458c89769d857a9e2a0a21efa6fa3ee653d0044a6763cd019a3b612ffc838838384382ea891ac6140508111c7e73dffe57166f1d76254d34fba905d4dc57280938d632dbb0b61df375baf31f97e7368f897ddf63b9fb37515b3f8fefc6986caf16fdc968ea7bfa25202006e0ba4aef50e3046f532b4fc1066d5e760f2d42796901379e1eef9126190b57f4d647679c03af12d1fa0549206c3debf881f44ea5199ad695862a718043a95bf21a7f58cbb75305cde68ad4ae1efd99c4e066da685ad6a71a72e24f0a2c969341f31d9661ae75f6e5acb9a7b537817c70ada5f7e3c2398313bd2f2b925f62b81f27c8dba6556b8a527ea342d5e31c015bf7a6128e474d0f12152763fd3d2680163b1a0527de67579be1a6a7916c1dff55ea5be54efa75248cc317e5bd1f66d26becf1a537c930212ef1466fc918001cff8eb1e3d39775c7dc83f87dcafd42bd979ce6fc5099ce497a574cd2e9c90d16c235ffe2fd48512aa4cd2ac40ac886839b74d9d2e554de9d8d3c0724101678013326d97d480376a9b0fae31db402f698b3b40f7f94bd280e2bd7923bd6ee156a40335677af05849a80ce45b1690feb9f27e4fe665f80cab04fde5ca01cc7e43d9beb1164b3fac2285d78ad395ded487255ba7655701469c44f55f0c1ec1e6ec1c466222f4b7f01d791f0d23c434f03ff6d7c686dc1ad0a8fe825c1129d393fd1459f94c60e41140ff033da26a6e47136281d592125d5a8c135e7c8e897353e376f0ccd031a45665f00b0ea7c32c62fddee9bc65b8050175dd1bfdffcbdcb0386da9f73744bda73fefb9f735cad21933e8bafff05e0606019699c69ef316d73ac70371126e2962658c018ddc77014d42f05692f3dc9501955750b30f8c6a504e7b297f8620b1e9861871656ce38151f8a1db29ab87b9f19e5c727203152afacfb6d8f0b3889cd935be9dc8eaf2f4ca9098ad71b8c07388364fe39ca7d02c54e7a8fed7d6b15757e9319395957c63de8eb1e553501b596ff317c89c86e3fca4cbf8183fdefbe714b08e23fe617daf77562980bcdbe33fb92d3d2973af2a8813bfb8062ca0d865b83a01512964255479532ecc4f7607e6146e1f67a088944a47d35178ef8c17cfb7dc2331836d2152ec87f2a8ca22eb18f3b4c0cb957a0b3b4439f8b9393aa1ebad42b1a00eb725c1f8422ada27a1ac9b664c67d9fe1493fca22ee3632c28e4d2d70732f90ff662d58ee8ae88a3d38054aedc13a67c06e348d13291a614f7d383f75a5198cf0ee182c776fd4a33d302b3c3fc753ce8520e639311f18cf956d50f167f668bfa4ea2e946d4398538c5cd158160eb236ae78793c626b3e89ba18d55863273129fed5458948eaef69c063c0f4120bd0215e6a6e3e3e1b12f8d37d042b3fb02c5fa67d703563ff73900292ace77f77df757abc05f061b696ee837cc4b79512a21748a301932062e07fc8298d510bd37e72b3b30a3a85301dfd29ab5b408aa35aa3b365768d16d3f08de468d6e5bfcd1723da22f083f08de54dbceeaeb367cd3cdef59befb6b3b11cf30154572849bc50dc1288ab9bf1c9c24269895bdec654f958c5882db1014a0b8f53e763f5eea65af779979b6b8f5d96b58d577e6caaee7224e3f235636b02c5e0bccfcd4f9c4665f889adb91cb3510e4718880a9f3b3b66c62a33417a77bdce18d475ceb10ad092d1aed558a241de7ba97a6ff2f7b1d7268ffe1f8c4d6c68d46dc78468eeaed8336121c47a4970fb82e7cbcc815855992127ef977f8dc95cceacb04f1d1e1007d74d91f82d1c31d08f7ec88b5f3f4369536d25a909aef9eb8eb17b8bb5471b944c6c954b68500eb0505deadd9f0be4250dd8c979f0f225a48653fede415a72062d2212f32fc24c9756ee7ca2d921eda20cfd3ab51a66e68899b20cefe94186396476d19e1c2bb23413e60087afdbc85fcfe71e68d041cedd8ebaa3e7eba2bfbccf02e10a2caae719d90351cfe3e1b722be90ca8fc664eabaea39e43fe7b9b8b6a7c9c497a67802f695588bdb8aa27bb746516ae5cd3e3e61f48962e23f6f65b8da480f6afe6368adef91a621a33e2439619238db2d462c2968b9e27fb9e0b9eb3ee6fe32ada07786c923eaffc3de94c865245039f1f2b9449ebf18f708c120a968a747d5d0b1ace12b64190140841479c67c37c08c9a60c9241cda9ae3764ef69f02e69ee66b1a377548c950e4196f4dbd4a42dad4b13afd1911c0aad2b116b5466b4237b72f0e379c5ad00309810b9f66d4a0832993c2bf285980298a5999cd1887ba40a57b1d7c761d2fd0a77f542851ad1ad3323d8e92b3dc108ed9bbae47d1829a29a25672ebdbb765fe287546196083685897437dd8a6bd6c27b5a3aece4698b3bb13b6f1d007a62793f24f87f4959d64b44d5a2a1ee996ade203d35ecb9359d91681bf0701a45d12bec005c35f10a0d03d1bffae743d43780a1692e47e31da2ad347bda4c3def61160ec63ce2b1021d9339518a23d6786f3b84f5f24fac1eed20a55a544c78cb648229643fd876f92db894f486f7bfaffdae7b24b55a74b75519062ce78dc739e8bcd91954d74869e2172ec53d3eea43dcc323e93f1a3afde0ebd2445acbde5e5dd4203274b38dc3502c2c5818bdce34da9ee211a88e2ecf8cccd9f5a63513ef1e5e068cec2ec3b3d31c3ee9e67ab2df2a8e518c313a095e6f9832440eddef09ebab099bde1bc1f9bfb8b1bc8faf93eda95a7599b7c733c7276981be3dbd4c623604649a346bacc804ecd21f93f8b83149611d47989ec6b663c81e0008e3d05ea1e5cbecc332db3b2c1aa574f9c96bc4745fe607fc29262f2aafde7021888788f135bebceb4a20ffb6af03731778efdc335f81aa41a76f5d5b97fac980e3895f3617d5acb176b4b2cd3a04894063851ef998791fcfcd8cf7ffcd9ecb8f55f0ca1217d26d685b63a83517fd78ff7e195551e44ad4a808c5b84d0cf1263da9d128f3d9010d25b56c7ff1800afde894b7dfddde60423d1b3df230bd3747163b640fd4eea7336934f5e24b859670024886d198bc956b7c462ef21db182f08d5ddf4f6428dfe8810d0ebd7c1cd345f3e07f0b1488c61b073272761d3b3ba29ff96530fdd9f28643ae347dcf59f2bdda3032d474ceb9fe3715e4187c1f3493f75b6a8b2e43d9029a1da99853a6ebe6e93421a1678f7186c1404b04ddb6400ca3a774d22466d74a6992216ca4a414065dabf46e4b7c8fe999dfa3bc2b67da729027f3525562848a199af135a8a06dad7b7f8cf43d66551b996aac42442545f5096ab9664ad598c555c0d789fbd18d89b2c33a284ab38100a55b6906556983c7b53d6d7a6b60ba87b7690ae34b866e7b5a0412306488cef34cc1c449a096ea5f3a51602c51f732a01aa4146baac5b1be3ec5db61ae50036c8dedec4b0b4", 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, &(0x7f0000001a00)=[{0x38, 0x104, 0x9, "124e8ea7b67401a90149d54671eb35bf4902bc4795f43c480d38e1a3c71b394b64"}, {0x98, 0x105, 0x1, "ea17b8da2abdeef48bfad20adab72d8edb878d5ab4b3e3a285d475051954209696b0096a3c1cbbec00f0fbbf7acca38eecaae92d104a74316bc01fe6993674eae97a50152cd66ef2a7fdf7648ba4f3b744e36fb6443310a693579052caf17358b693b7a57818e028308d65fa1ae0d389ee1bd16d5cf96251b463c12fc4d47b0e9da30352455b3f"}, {0xa8, 0x3a, 0x3, "b777f45417ad81c3a37e60c8c71a0077f18e58db81cb893e14736f1a6326dada133a320fa37f452d90d2a062e3dad049d7db8bf00abc6083e693753f9aed127edb942e6c0fc26f82183d72bb2cacb78c82d2ff435452c47edd9ee64b1c060ec6b40027ebae067bc7316b502bf973746c1061bdd2a227bc6cbe86f87a3b27af054684ed1b6fa26b9e9ca3e8374cc6ab4789"}], 0x178}, 0x50) 19:51:49 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 19:51:49 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r1, r1) r3 = dup2(r0, r2) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x102, &(0x7f00000000c0), &(0x7f0000000100)=0x8) [ 1096.770428] 8021q: adding VLAN 0 to HW filter on device team0 [ 1096.806804] device team0 entered promiscuous mode [ 1096.846156] device team_slave_0 entered promiscuous mode [ 1096.869534] bond0: Enslaving team0 as an active interface with an up link 19:51:49 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60bc435a000029000700deb84502677911517344254987beff02"], 0x0) 19:51:49 executing program 3: fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) [ 1096.903545] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1096.935659] bond0: Releasing backup interface team0 [ 1096.983087] device team0 left promiscuous mode [ 1096.996782] device team_slave_0 left promiscuous mode 19:51:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 19:51:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000480)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) 19:51:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440003000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:50 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0x101, &(0x7f0000000280), &(0x7f0000000340)=0x98) 19:51:50 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) getsockname$inet6(r1, 0x0, &(0x7f0000000340)) [ 1097.223747] bridge0: port 12(team0) entered blocking state [ 1097.229514] bridge0: port 12(team0) entered disabled state [ 1097.236866] device team0 entered promiscuous mode [ 1097.242385] device team_slave_0 entered promiscuous mode [ 1097.344510] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1097.359088] device team0 left promiscuous mode [ 1097.377700] device team_slave_0 left promiscuous mode [ 1097.393760] bridge0: port 12(team0) entered disabled state [ 1097.404733] 8021q: adding VLAN 0 to HW filter on device team0 [ 1097.411966] device team0 entered promiscuous mode [ 1097.417067] device team_slave_0 entered promiscuous mode [ 1097.430248] bond0: Enslaving team0 as an active interface with an up link [ 1097.445719] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1097.457774] bond0: Releasing backup interface team0 [ 1097.464384] device team0 left promiscuous mode [ 1097.469043] device team_slave_0 left promiscuous mode 19:51:50 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x0) 19:51:50 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r1, r1) r3 = dup2(r0, r2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100), 0x88) 19:51:50 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') 19:51:50 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x40003) 19:51:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0x100, &(0x7f0000000240), &(0x7f0000000300)=0xb0) 19:51:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440004000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1097.568149] bridge0: port 12(team0) entered blocking state [ 1097.575028] bridge0: port 12(team0) entered disabled state [ 1097.581989] device team0 entered promiscuous mode [ 1097.586844] device team_slave_0 entered promiscuous mode 19:51:50 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000001540)={0x10, 0x2}, 0x10) connect$inet(r1, &(0x7f0000000900)={0x48, 0x2}, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$inet_sctp(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002b40)=[{&(0x7f0000000580)="b3060afae7c9e9f3f856ff2127d6a9bc754d21c2e17fe25c5a89938718f417219e60cbaefd96840c1727a5c864ce61a1830a44812f2f6abb44e85d6f073788f54e2dfdd33fe576560398983409a4f9b322d53a0c85acf7ac92787fe93fedb4610977a6bb0d9fd505430e8143f5a425f5dc1b929fe1", 0x75}, {&(0x7f0000001a40)="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", 0xacf}], 0x2, &(0x7f0000002c80)=[@sndrcv={0x2c}], 0x2c}, 0x0) 19:51:50 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="2eaf86b762557b42d03c3d12aa8488a299d5ce0a0a327d126d3a9c82a6c674f34d5c18c1127425c9f4f2da712bfa837ccd9b1cf9111cc1015d8be8e3ccc4ceb223656556dd807a548d038dae3127258d6a5f476526874748c5fcb23a254abb3341977161c7a88fb5f00e24f999e13e167db468840828e3a6ebacb90831ce887d6aed7ddfb08ea011b01e88ad349a1ead2b92c0d1d3a61b0407", 0x99, 0x0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 19:51:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000300)=0x88) 19:51:50 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x2}, 0x1c) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=""/125, 0x7d}, 0x0) 19:51:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x107, &(0x7f0000000080), &(0x7f00000000c0)=0x18) [ 1097.745821] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1097.768590] device team0 left promiscuous mode [ 1097.806083] device team_slave_0 left promiscuous mode [ 1097.825186] bridge0: port 12(team0) entered disabled state 19:51:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x103, &(0x7f0000000000), &(0x7f0000000080)=0x8) 19:51:50 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 19:51:50 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x4, &(0x7f00000000c0), 0x4) [ 1097.869691] 8021q: adding VLAN 0 to HW filter on device team0 [ 1097.902807] device team0 entered promiscuous mode 19:51:50 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x1c) 19:51:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x1ff}, 0x14) [ 1097.939399] device team_slave_0 entered promiscuous mode [ 1097.966042] bond0: Enslaving team0 as an active interface with an up link 19:51:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup2(r1, r0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0x100, &(0x7f0000000240), &(0x7f0000000300)=0xb0) [ 1098.005198] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1098.028209] bond0: Releasing backup interface team0 [ 1098.054555] device team0 left promiscuous mode [ 1098.082926] device team_slave_0 left promiscuous mode 19:51:51 executing program 5: getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 19:51:51 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)) 19:51:51 executing program 1: r0 = msgget(0x3, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/213) 19:51:51 executing program 4: ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) 19:51:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440005000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:51 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/devices/system', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000e80)='syz0\x00', 0x200002, 0x0) [ 1098.275341] bridge0: port 12(team0) entered blocking state [ 1098.281277] bridge0: port 12(team0) entered disabled state [ 1098.287874] device team0 entered promiscuous mode [ 1098.294376] device team_slave_0 entered promiscuous mode 19:51:51 executing program 4: r0 = msgget(0x3, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x3, 0xee01, 0x0, 0xee00, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 19:51:51 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000240)) 19:51:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000700)={&(0x7f00000002c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0}, 0x0) 19:51:51 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff}) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040)={'veth1_virt_wifi'}, 0xfffffffffffffeaa) 19:51:51 executing program 3: r0 = epoll_create(0x3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000000c0)) [ 1098.414017] device team0 left promiscuous mode [ 1098.426908] device team_slave_0 left promiscuous mode [ 1098.445489] bridge0: port 12(team0) entered disabled state [ 1098.493802] 8021q: adding VLAN 0 to HW filter on device team0 [ 1098.520415] device team0 entered promiscuous mode 19:51:51 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000000c0), 0x0, 0x0, 0x2) 19:51:51 executing program 3: r0 = epoll_create1(0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) 19:51:51 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) recvmmsg(r0, &(0x7f0000004180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12040, 0x0) [ 1098.535789] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1098.558421] device team_slave_0 entered promiscuous mode [ 1098.582400] bond0: Enslaving team0 as an active interface with an up link 19:51:51 executing program 5: bpf$PROG_LOAD(0x4, 0x0, 0x7) 19:51:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x8000}, 0x20) [ 1098.606049] bond0: Releasing backup interface team0 [ 1098.612006] device team0 left promiscuous mode [ 1098.660814] device team_slave_0 left promiscuous mode 19:51:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440006000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x7}, {0xa}, {0x6}, {}]}, @var={0xc}]}}, &(0x7f0000000380)=""/230, 0x56, 0xe6, 0x1}, 0x20) 19:51:51 executing program 2: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 19:51:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000008140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002380)=[{0x10, 0x1}], 0x10}}], 0x1, 0x0) 19:51:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100), 0x4) 19:51:51 executing program 3: bpf$PROG_LOAD(0x7, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1098.860867] bridge0: port 12(team0) entered blocking state [ 1098.866586] bridge0: port 12(team0) entered disabled state [ 1098.873661] device team0 entered promiscuous mode [ 1098.878508] device team_slave_0 entered promiscuous mode 19:51:51 executing program 2: bpf$PROG_LOAD(0x15, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000400)={'veth0_to_bond\x00', &(0x7f0000000300)=@ethtool_rxnfc={0x31, 0x0, 0x0, {0x0, @tcp_ip6_spec={@empty, @local}, {0x0, @remote}, @usr_ip6_spec={@loopback, @dev}, {0x0, @remote}}}}) 19:51:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003fc0)=[{{&(0x7f0000000100)={0x2, 0x4e24, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000026c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4, 0x300}]}}}], 0x18}}], 0x1, 0x0) 19:51:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, 0x28) [ 1099.003412] device team0 left promiscuous mode [ 1099.018387] device team_slave_0 left promiscuous mode [ 1099.037577] bridge0: port 12(team0) entered disabled state 19:51:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e0, 0x0, 0x2b8, 0x0, 0x0, 0x0, 0x210, 0x3a8, 0x3a8, 0x210, 0x3a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x100, 0x120, 0x0, {}, [@common=@inet=@set1={{0x28}, {{0x0, 0x7}}}, @common=@inet=@udplite={{0x30}}]}, @unspec=@TRACE={0x20}}, {{@ipv6={@private2, @local, [], [], 'lo\x00', 'bond_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x340) [ 1099.051986] 8021q: adding VLAN 0 to HW filter on device team0 [ 1099.066656] device team0 entered promiscuous mode [ 1099.090487] device team_slave_0 entered promiscuous mode 19:51:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004ac0)={0x11, 0x4, &(0x7f0000003980)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000003a00)='GPL\x00', 0x5, 0x1000, &(0x7f0000003a40)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1099.117583] bond0: Enslaving team0 as an active interface with an up link [ 1099.155888] bond0: Releasing backup interface team0 [ 1099.161877] device team0 left promiscuous mode [ 1099.177287] device team_slave_0 left promiscuous mode [ 1099.216683] Cannot find set identified by id 0 to match 19:51:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x20}}], 0x1, 0x0) 19:51:52 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x5000}, 0x0) 19:51:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) connect$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 19:51:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000040)=""/192, 0x2b, 0xc0, 0x1}, 0x20) 19:51:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440007000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002ac0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@rights={{0x10}}], 0x10}}], 0x1, 0x0) [ 1099.353525] bridge0: port 12(team0) entered blocking state [ 1099.359360] bridge0: port 12(team0) entered disabled state [ 1099.366852] device team0 entered promiscuous mode [ 1099.371944] device team_slave_0 entered promiscuous mode 19:51:52 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x50, 0x13, 0x803, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x3}]}, 0x50}}, 0x0) 19:51:52 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000012c0)=ANY=[], 0x54}}, 0x0) 19:51:52 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f0000fec000/0x14000)=nil, 0x14002, 0x0, 0x12, r0, 0x0) 19:51:52 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ec0000001500010026bd7000fcdbdf2570"], 0xec}}, 0x0) 19:51:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 1099.515012] device team0 left promiscuous mode [ 1099.539814] device team_slave_0 left promiscuous mode [ 1099.566692] bridge0: port 12(team0) entered disabled state [ 1099.603935] 8021q: adding VLAN 0 to HW filter on device team0 19:51:52 executing program 5: syz_emit_ethernet(0x16, &(0x7f0000000180)={@dev, @multicast, @void, {@mpls_mc={0x8848, {[], @llc={@snap={0x0, 0x0, "15", '!=5'}}}}}}, 0x0) 19:51:52 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x50, 0x13, 0x803, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x8}]}, 0x50}}, 0x0) [ 1099.631580] device team0 entered promiscuous mode 19:51:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x6, 0x70c}, 0x48) 19:51:52 executing program 1: bpf$PROG_LOAD(0xf, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000009440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4040) [ 1099.659436] device team_slave_0 entered promiscuous mode [ 1099.683198] bond0: Enslaving team0 as an active interface with an up link [ 1099.733499] bond0: Releasing backup interface team0 [ 1099.743371] device team0 left promiscuous mode [ 1099.775096] device team_slave_0 left promiscuous mode 19:51:52 executing program 1: r0 = socket(0x11, 0xa, 0x0) getpeername(r0, 0x0, 0x0) 19:51:52 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0xb, &(0x7f0000000080)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x8}, @btf_id, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @map_idx_val, @alu={0x7}, @initr0, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], &(0x7f0000000100)='syzkaller\x00', 0x5, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x3a, 0x3, &(0x7f0000000800)=@framed, &(0x7f00000008c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000007c0)={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40400000}) 19:51:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440008000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000380)=""/230, 0x26, 0xe6, 0x1}, 0x20) [ 1099.956087] bridge0: port 12(team0) entered blocking state [ 1099.961863] bridge0: port 12(team0) entered disabled state [ 1099.968245] device team0 entered promiscuous mode [ 1099.973230] device team_slave_0 entered promiscuous mode 19:51:52 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0xb, &(0x7f0000000080)=@raw=[@func, @btf_id, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @map_idx_val, @alu, @initr0, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], &(0x7f0000000100)='syzkaller\x00', 0x5, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:52 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0xf, 0x13, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}]}, 0x50}}, 0x0) 19:51:52 executing program 4: bpf$PROG_LOAD(0x4, 0x0, 0x0) 19:51:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x6, 0x8000}, 0x48) 19:51:52 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x1, &(0x7f0000000040)=@raw=[@kfunc], &(0x7f0000000080)='syzkaller\x00', 0x1, 0x8b, &(0x7f00000000c0)=""/139, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1100.081797] device team0 left promiscuous mode [ 1100.089591] device team_slave_0 left promiscuous mode [ 1100.141135] bridge0: port 12(team0) entered disabled state [ 1100.182376] 8021q: adding VLAN 0 to HW filter on device team0 [ 1100.207636] device team0 entered promiscuous mode 19:51:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x6, 0x70c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, 0x48) 19:51:53 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x37, 0x0, &(0x7f0000000fc0)) 19:51:53 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xbd, &(0x7f00000000c0)=""/189, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:53 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x4c, 0x13, 0x803}, 0x4c}}, 0x0) [ 1100.230114] device team_slave_0 entered promiscuous mode 19:51:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000), 0x8) [ 1100.275147] bond0: Enslaving team0 as an active interface with an up link [ 1100.309171] bond0: Releasing backup interface team0 [ 1100.325487] device team0 left promiscuous mode [ 1100.361660] device team_slave_0 left promiscuous mode 19:51:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000a000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:53 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, &(0x7f0000000080)) 19:51:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000002c0)=0xd42a038cf03672c6, 0x4) 19:51:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000002a40)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0}}], 0x1, 0x20000000) 19:51:53 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x6, 0x70c, 0x4}, 0x48) 19:51:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x2010, r0, 0x0) [ 1100.536102] bridge0: port 12(team0) entered blocking state [ 1100.541995] bridge0: port 12(team0) entered disabled state [ 1100.550086] device team0 entered promiscuous mode [ 1100.556027] device team_slave_0 entered promiscuous mode 19:51:53 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x2, 0x0, 0xfff9, 0x9}, 0x20) 19:51:53 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x50, 0x13, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}]}, 0xfffffdef}}, 0x0) 19:51:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 19:51:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) bind$unix(r0, 0x0, 0x0) [ 1100.664404] validate_nla: 8 callbacks suppressed [ 1100.664414] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1100.714429] device team0 left promiscuous mode [ 1100.734943] device team_slave_0 left promiscuous mode 19:51:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x44, 0x0, &(0x7f0000000000)) [ 1100.756075] bridge0: port 12(team0) entered disabled state 19:51:53 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="18006b00", @ANYRES16=r1, @ANYBLOB="080000000000000000001700000004000180"], 0x18}, 0x1, 0x0, 0x0, 0x4010}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x5c0e, 0x5b, &(0x7f0000000680)=""/91, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2, 0x2}, 0x8, 0x10, 0x0}, 0x80) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x4004ffe0, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r5}, 0x8) syz_genetlink_get_family_id$mptcp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r7, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="a4a82abd7000fddbdf251a0000000400cc0006002100620000000400cc00fbc66749548986c0356d17713303cf77c571f3eaa6bd452494d50f"], 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x8000) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000108070000", @ANYRES32=0x0, @ANYBLOB="0c00990081000000580000000c00580005000000000000000c00580037000000000000000c0058000300000000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x45}, 0xc8be41a934bc754e) sendmsg(r2, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000140)="e15b14b1", 0x5be1}], 0x1}, 0x0) [ 1100.796977] 8021q: adding VLAN 0 to HW filter on device team0 [ 1100.836596] device team0 entered promiscuous mode [ 1100.846008] device team_slave_0 entered promiscuous mode [ 1100.855596] bond0: Enslaving team0 as an active interface with an up link [ 1100.868768] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1100.895346] bond0: Releasing backup interface team0 [ 1100.904848] device team0 left promiscuous mode [ 1100.910075] device team_slave_0 left promiscuous mode 19:51:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000b000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:53 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x0, 0x11, r0, 0x0) 19:51:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:51:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x0, 0x80000000}}]}}, &(0x7f0000000180)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 19:51:53 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="18006b00", @ANYRES16=r1, @ANYBLOB="080000000000000000001700000004000180"], 0x18}, 0x1, 0x0, 0x0, 0x4010}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x5c0e, 0x5b, &(0x7f0000000680)=""/91, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2, 0x2}, 0x8, 0x10, 0x0}, 0x80) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x4004ffe0, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r5}, 0x8) syz_genetlink_get_family_id$mptcp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r7, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="a4a82abd7000fddbdf251a0000000400cc0006002100620000000400cc00fbc66749548986c0356d17713303cf77c571f3eaa6bd452494d50f"], 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x8000) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000108070000", @ANYRES32=0x0, @ANYBLOB="0c00990081000000580000000c00580005000000000000000c00580037000000000000000c0058000300000000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x45}, 0xc8be41a934bc754e) sendmsg(r2, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000140)="e15b14b1", 0x5be1}], 0x1}, 0x0) 19:51:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x7d, 0x7fffffff, 0xbe}, 0x48) [ 1101.106191] bridge0: port 12(team0) entered blocking state [ 1101.112532] bridge0: port 12(team0) entered disabled state [ 1101.119083] device team0 entered promiscuous mode [ 1101.125374] device team_slave_0 entered promiscuous mode 19:51:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x1}, 0x14}}, 0x0) 19:51:54 executing program 2: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x2, &(0x7f00000000c0)=@raw=[@btf_id], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 19:51:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x19, 0x0, 0x0, 0x55, 0x0, 0x1}, 0x48) 19:51:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000040)=""/105, &(0x7f00000000c0)=0x69) [ 1101.184295] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1101.212702] device team0 left promiscuous mode [ 1101.217643] device team_slave_0 left promiscuous mode [ 1101.226365] bridge0: port 12(team0) entered disabled state 19:51:54 executing program 1: bpf$PROG_LOAD(0x11, 0x0, 0x0) 19:51:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000140)=0x4, 0x4) [ 1101.253924] 8021q: adding VLAN 0 to HW filter on device team0 [ 1101.286772] device team0 entered promiscuous mode [ 1101.295277] device team_slave_0 entered promiscuous mode [ 1101.305216] bond0: Enslaving team0 as an active interface with an up link [ 1101.318690] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1101.339171] bond0: Releasing backup interface team0 [ 1101.357124] device team0 left promiscuous mode [ 1101.394750] device team_slave_0 left promiscuous mode 19:51:54 executing program 2: pipe(&(0x7f0000004d00)) 19:51:54 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="18006b00", @ANYRES16=r1, @ANYBLOB="080000000000000000001700000004000180"], 0x18}, 0x1, 0x0, 0x0, 0x4010}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x5c0e, 0x5b, &(0x7f0000000680)=""/91, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2, 0x2}, 0x8, 0x10, 0x0}, 0x80) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x4004ffe0, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r5}, 0x8) syz_genetlink_get_family_id$mptcp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r7, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="a4a82abd7000fddbdf251a0000000400cc0006002100620000000400cc00fbc66749548986c0356d17713303cf77c571f3eaa6bd452494d50f"], 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x8000) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000108070000", @ANYRES32=0x0, @ANYBLOB="0c00990081000000580000000c00580005000000000000000c00580037000000000000000c0058000300000000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x45}, 0xc8be41a934bc754e) sendmsg(r2, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000140)="e15b14b1", 0x5be1}], 0x1}, 0x0) 19:51:54 executing program 5: pipe(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x3, 0x7ff29299}, 0x48) 19:51:54 executing program 3: socket(0x2e733801f29027f1, 0x0, 0x0) 19:51:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000c000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:54 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000007c0)={'ip6_vti0\x00', &(0x7f0000000740)={'ip6tnl0\x00', 0x0, 0x4, 0x9, 0x1f, 0x8, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x9}}) r2 = socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0xc10c, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x4c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c}}]}, 0x4c}}, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) [ 1101.504898] bridge0: port 12(team0) entered blocking state [ 1101.510713] bridge0: port 12(team0) entered disabled state [ 1101.517084] device team0 entered promiscuous mode [ 1101.522129] device team_slave_0 entered promiscuous mode 19:51:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'bond_slave_0\x00', &(0x7f0000000140)=@ethtool_gstrings}) 19:51:54 executing program 5: bpf$PROG_LOAD(0x9, 0x0, 0x0) 19:51:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 19:51:54 executing program 1: syz_emit_ethernet(0x11fe, &(0x7f00000013c0)=ANY=[@ANYBLOB="aaaaaaaaaa1cbbbbbbbbbbbb91"], 0x0) 19:51:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'team_slave_0\x00', &(0x7f0000000300)=@ethtool_cmd={0x27}}) 19:51:54 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x0, 0x800}, 0x48) [ 1101.608295] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1101.640048] device team0 left promiscuous mode 19:51:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1101.685182] device team_slave_0 left promiscuous mode 19:51:54 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="18006b00", @ANYRES16=r1, @ANYBLOB="080000000000000000001700000004000180"], 0x18}, 0x1, 0x0, 0x0, 0x4010}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x5c0e, 0x5b, &(0x7f0000000680)=""/91, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2, 0x2}, 0x8, 0x10, 0x0}, 0x80) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x4004ffe0, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r5}, 0x8) syz_genetlink_get_family_id$mptcp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r7, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="a4a82abd7000fddbdf251a0000000400cc0006002100620000000400cc00fbc66749548986c0356d17713303cf77c571f3eaa6bd452494d50f"], 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x8000) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000108070000", @ANYRES32=0x0, @ANYBLOB="0c00990081000000580000000c00580005000000000000000c00580037000000000000000c0058000300000000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x45}, 0xc8be41a934bc754e) sendmsg(r2, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000140)="e15b14b1", 0x5be1}], 0x1}, 0x0) 19:51:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f00000047c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, &(0x7f0000001440)=[{&(0x7f0000000040)="1c", 0x1}], 0x1}}], 0x1, 0x24008010) [ 1101.708417] bridge0: port 12(team0) entered disabled state [ 1101.741039] 8021q: adding VLAN 0 to HW filter on device team0 19:51:54 executing program 5: bpf$OBJ_PIN_MAP(0x8, &(0x7f00000000c0)={0x0}, 0x10) [ 1101.756077] device team0 entered promiscuous mode [ 1101.780019] device team_slave_0 entered promiscuous mode [ 1101.796055] bond0: Enslaving team0 as an active interface with an up link [ 1101.812858] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1101.844159] bond0: Releasing backup interface team0 [ 1101.857279] device team0 left promiscuous mode [ 1101.864858] device team_slave_0 left promiscuous mode 19:51:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000e000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0xffff}]}]}}, &(0x7f0000000380)=""/230, 0x36, 0xe6, 0x1}, 0x20) 19:51:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7}, 0x20) 19:51:54 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x3000002, 0x12, r0, 0x0) 19:51:54 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000001500)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, 0x0}}], 0x1, 0x0) [ 1102.008088] bridge0: port 12(team0) entered blocking state [ 1102.013873] bridge0: port 12(team0) entered disabled state [ 1102.020406] device team0 entered promiscuous mode [ 1102.025260] device team_slave_0 entered promiscuous mode 19:51:54 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) 19:51:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="28000000080601080000000000000000000000000900020073797a32000000000500010007"], 0x28}}, 0x0) 19:51:54 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000340)={&(0x7f0000000000), 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x54, 0x12, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x4}]}, 0x54}}, 0x0) 19:51:54 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000001500)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffffd}, 0x1c, 0x0, 0x0, &(0x7f0000001200)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x0) [ 1102.073468] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x7d, 0x0, 0xbe}, 0x48) [ 1102.128146] device team0 left promiscuous mode [ 1102.146950] device team_slave_0 left promiscuous mode [ 1102.154391] bridge0: port 12(team0) entered disabled state [ 1102.173828] 8021q: adding VLAN 0 to HW filter on device team0 [ 1102.192399] device team0 entered promiscuous mode [ 1102.197391] device team_slave_0 entered promiscuous mode [ 1102.206326] bond0: Enslaving team0 as an active interface with an up link [ 1102.219896] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1102.230492] bond0: Releasing backup interface team0 [ 1102.236001] device team0 left promiscuous mode [ 1102.241557] device team_slave_0 left promiscuous mode [ 1102.366421] bridge0: port 12(team0) entered blocking state [ 1102.372213] bridge0: port 12(team0) entered disabled state [ 1102.378715] device team0 entered promiscuous mode [ 1102.384961] device team_slave_0 entered promiscuous mode 19:51:55 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) 19:51:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000100)) 19:51:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000500)={'veth0\x00', &(0x7f00000004c0)=@ethtool_modinfo}) 19:51:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/182, 0x0, 0xb6}, 0x20) 19:51:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000f000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:55 executing program 5: bpf$PROG_LOAD(0x8, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:55 executing program 1: bpf$PROG_LOAD(0x22, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000100), 0x0) [ 1102.647779] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:51:55 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004ac0)={0x11, 0x3, &(0x7f0000003980)=@framed, &(0x7f0000003a00)='GPL\x00', 0x5, 0x1000, &(0x7f0000003a40)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:55 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x7fffffffefff, 0xf0}, 0x0) [ 1102.701375] device team0 left promiscuous mode 19:51:55 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="a4", 0x1}], 0x1}, 0x400c840) 19:51:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 1102.728711] device team_slave_0 left promiscuous mode 19:51:55 executing program 2: bpf$PROG_LOAD(0x19, 0x0, 0x0) 19:51:55 executing program 3: socketpair(0xa, 0x3, 0x0, &(0x7f0000000100)) 19:51:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x4, 0x0, 0x0, 0x0) [ 1102.764571] bridge0: port 12(team0) entered disabled state [ 1102.809858] 8021q: adding VLAN 0 to HW filter on device team0 [ 1102.848181] device team0 entered promiscuous mode [ 1102.858479] device team_slave_0 entered promiscuous mode [ 1102.889057] bond0: Enslaving team0 as an active interface with an up link [ 1102.897746] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1102.913167] bond0: Releasing backup interface team0 [ 1102.919271] device team0 left promiscuous mode [ 1102.929306] device team_slave_0 left promiscuous mode 19:51:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440010000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:55 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x6, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 19:51:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0xc, 0x70c}, 0x48) 19:51:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "cf"}]}}, &(0x7f0000000200)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 19:51:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}, 0x400c840) 19:51:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'nat\x00', 0x2, [{}, {}]}, 0x48) [ 1103.025865] bridge0: port 12(team0) entered blocking state [ 1103.031600] bridge0: port 12(team0) entered disabled state [ 1103.038044] device team0 entered promiscuous mode [ 1103.043106] device team_slave_0 entered promiscuous mode 19:51:55 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x0, 0x13, r0, 0x0) [ 1103.094426] device team0 left promiscuous mode 19:51:55 executing program 2: bpf$OBJ_PIN_MAP(0x7, &(0x7f00000000c0)={0x0}, 0x10) 19:51:55 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000805) 19:51:55 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x20) [ 1103.118369] device team_slave_0 left promiscuous mode 19:51:56 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) [ 1103.139615] bridge0: port 12(team0) entered disabled state [ 1103.163545] 8021q: adding VLAN 0 to HW filter on device team0 [ 1103.180221] device team0 entered promiscuous mode 19:51:56 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000001500)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffffd}, 0x1c, 0x0, 0x0, &(0x7f0000001200)=[@dontfrag={{0x14, 0x29, 0x3e, 0x6}}], 0x18}}], 0x1, 0x0) [ 1103.186534] device team_slave_0 entered promiscuous mode [ 1103.217338] bond0: Enslaving team0 as an active interface with an up link [ 1103.240785] bond0: Releasing backup interface team0 [ 1103.250868] device team0 left promiscuous mode [ 1103.258985] device team_slave_0 left promiscuous mode [ 1103.373565] bridge0: port 12(team0) entered blocking state [ 1103.379278] bridge0: port 12(team0) entered disabled state [ 1103.386091] device team0 entered promiscuous mode [ 1103.391092] device team_slave_0 entered promiscuous mode 19:51:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440011000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:56 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x50, 0x13, 0x803, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xd}]}, 0x50}}, 0x0) 19:51:56 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000001500)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, 0x0}}], 0x1, 0x0) 19:51:56 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x1ffff000, 0xf0}, 0x0) 19:51:56 executing program 1: ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={@dev, @private1, @dev}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0xce) 19:51:56 executing program 4: syz_emit_ethernet(0x11, &(0x7f0000000000)={@multicast, @empty, @void, {@llc={0x4, {@llc={0x0, 0x0, "8d"}}}}}, 0x0) [ 1103.471852] device team0 left promiscuous mode 19:51:56 executing program 4: pipe(&(0x7f00000002c0)) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 19:51:56 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "de3cdf", 0x44, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x88be}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1200}, {0x0, 0x0, 0x0, 0x0, 0x1f4}, {0x8, 0x88c0}}}}}}}, 0x0) [ 1103.495039] device team_slave_0 left promiscuous mode 19:51:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, &(0x7f0000000280)=""/129, 0xf8, 0x81, 0x1}, 0x20) 19:51:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 19:51:56 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) 19:51:56 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x7}, 0x48) [ 1103.522726] bridge0: port 12(team0) entered disabled state [ 1103.562797] 8021q: adding VLAN 0 to HW filter on device team0 [ 1103.595200] device team0 entered promiscuous mode [ 1103.615383] device team_slave_0 entered promiscuous mode [ 1103.628907] bond0: Enslaving team0 as an active interface with an up link [ 1103.646824] bond0: Releasing backup interface team0 [ 1103.666875] device team0 left promiscuous mode [ 1103.685529] device team_slave_0 left promiscuous mode 19:51:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440012000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r1, 0x7e74b589a2e5a31f, 0x0, 0x0, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}}, 0x0) 19:51:56 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x0, 0x12, r0, 0x0) 19:51:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89fb, &(0x7f0000000140)) 19:51:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @local, 'veth1_to_team\x00'}}, 0x80, 0x0}}], 0x2, 0x0) 19:51:56 executing program 4: bpf$PROG_LOAD(0x12, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1103.781580] bridge0: port 12(team0) entered blocking state [ 1103.787328] bridge0: port 12(team0) entered disabled state [ 1103.795128] device team0 entered promiscuous mode [ 1103.800494] device team_slave_0 entered promiscuous mode 19:51:56 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x3, 0x7ff29299}, 0x48) 19:51:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x7}, {0xa}, {0x6}, {}]}]}}, &(0x7f0000000380)=""/230, 0x46, 0xe6, 0x1}, 0x20) 19:51:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004ac0)={0x11, 0x4, &(0x7f0000003980)=@framed={{}, [@kfunc]}, &(0x7f0000003a00)='GPL\x00', 0x5, 0x1000, &(0x7f0000003a40)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1103.913302] device team0 left promiscuous mode 19:51:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x4}]}]}}, &(0x7f0000000180)=""/223, 0x36, 0xdf, 0x1}, 0x20) 19:51:56 executing program 4: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) [ 1103.933681] device team_slave_0 left promiscuous mode 19:51:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @private}}}], 0x20}, 0x41) [ 1103.954025] bridge0: port 12(team0) entered disabled state [ 1103.998512] 8021q: adding VLAN 0 to HW filter on device team0 [ 1104.021875] device team0 entered promiscuous mode [ 1104.035334] device team_slave_0 entered promiscuous mode [ 1104.051390] bond0: Enslaving team0 as an active interface with an up link [ 1104.080209] bond0: Releasing backup interface team0 [ 1104.088999] device team0 left promiscuous mode [ 1104.100349] device team_slave_0 left promiscuous mode 19:51:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440014000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x8, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0xa, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x22}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:57 executing program 4: syz_clone(0x33021500, 0x0, 0x0, 0x0, 0x0, 0x0) 19:51:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000003940)={0x0, 0x0, 0x0}, 0x0) 19:51:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x10, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1104.196496] bridge0: port 12(team0) entered blocking state [ 1104.202356] bridge0: port 12(team0) entered disabled state [ 1104.208847] device team0 entered promiscuous mode [ 1104.214998] device team_slave_0 entered promiscuous mode 19:51:57 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) close(r0) 19:51:57 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x9, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0x0, 0x0}, 0x10) 19:51:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0x10001}]}]}}, &(0x7f0000000180)=""/245, 0x32, 0xf5, 0x1}, 0x20) [ 1104.307686] device team0 left promiscuous mode 19:51:57 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x2403, 0x0) [ 1104.348550] device team_slave_0 left promiscuous mode 19:51:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x2, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1104.374860] bridge0: port 12(team0) entered disabled state [ 1104.428167] 8021q: adding VLAN 0 to HW filter on device team0 [ 1104.466746] device team0 entered promiscuous mode [ 1104.477167] device team_slave_0 entered promiscuous mode [ 1104.484974] bond0: Enslaving team0 as an active interface with an up link [ 1104.498592] bond0: Releasing backup interface team0 [ 1104.504880] device team0 left promiscuous mode [ 1104.509623] device team_slave_0 left promiscuous mode 19:51:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440015000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001940)=@base={0x2, 0x4, 0x4, 0x81}, 0x48) close(r0) 19:51:57 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x14, 0x0, 0x0, 0x0}, 0x20) 19:51:57 executing program 1: perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:51:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x35}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff66}, 0x48) 19:51:57 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x18}, 0xc) [ 1104.605226] bridge0: port 12(team0) entered blocking state [ 1104.610978] bridge0: port 12(team0) entered disabled state [ 1104.617396] device team0 entered promiscuous mode [ 1104.623319] device team_slave_0 entered promiscuous mode 19:51:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x7, 0x0, 0x0, 0x0, 0x104e, 0x1}, 0x48) 19:51:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x3b}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff66}, 0x48) 19:51:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001940)=@base={0x3, 0x0, 0x4, 0x0, 0x4}, 0x48) 19:51:57 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xe00) 19:51:57 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x8, 0x0, 0x0, 0x0}, 0x20) 19:51:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0x2, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001180)='cgroup.kill\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) [ 1104.729436] device team0 left promiscuous mode [ 1104.770604] device team_slave_0 left promiscuous mode [ 1104.796778] bridge0: port 12(team0) entered disabled state [ 1104.845147] 8021q: adding VLAN 0 to HW filter on device team0 [ 1104.860802] device team0 entered promiscuous mode [ 1104.865771] device team_slave_0 entered promiscuous mode [ 1104.873748] bond0: Enslaving team0 as an active interface with an up link [ 1104.882981] bond0: Releasing backup interface team0 [ 1104.888355] device team0 left promiscuous mode [ 1104.893492] device team_slave_0 left promiscuous mode 19:51:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440017000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x9}]}}, &(0x7f0000000680)=""/128, 0x26, 0x80, 0x1}, 0x20) 19:51:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:57 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x10, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5b}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:57 executing program 2: perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2250}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:51:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001940)=@base={0x6, 0x4, 0x4, 0x81, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) [ 1104.987981] bridge0: port 12(team0) entered blocking state [ 1104.993759] bridge0: port 12(team0) entered disabled state [ 1105.001664] device team0 entered promiscuous mode [ 1105.006674] device team_slave_0 entered promiscuous mode 19:51:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x63}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:57 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0xb, 0x0, 0x0, 0x0}, 0x20) [ 1105.046070] device team0 left promiscuous mode [ 1105.059156] device team_slave_0 left promiscuous mode [ 1105.071214] bridge0: port 12(team0) entered disabled state 19:51:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000680)=""/128, 0x1000000, 0x80, 0x1}, 0x20) 19:51:57 executing program 2: perf_event_open$cgroup(&(0x7f00000000c0)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:51:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x9, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={@cgroup, r0, 0x10}, 0x10) [ 1105.107513] 8021q: adding VLAN 0 to HW filter on device team0 [ 1105.140444] device team0 entered promiscuous mode 19:51:58 executing program 3: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) [ 1105.167674] device team_slave_0 entered promiscuous mode [ 1105.215666] bond0: Enslaving team0 as an active interface with an up link [ 1105.251091] bond0: Releasing backup interface team0 [ 1105.258077] device team0 left promiscuous mode [ 1105.286314] device team_slave_0 left promiscuous mode 19:51:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0xa, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440018000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e40)={0xc, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000f7ff00000000000003000000850000001500000095"], &(0x7f0000000040)='syzkaller\x00', 0x7, 0xff4, &(0x7f0000001a00)=""/4084, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:58 executing program 3: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:51:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:58 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x15, 0x0, 0x0, 0x0}, 0x20) [ 1105.419187] bridge0: port 12(team0) entered blocking state [ 1105.425013] bridge0: port 12(team0) entered disabled state [ 1105.433702] device team0 entered promiscuous mode [ 1105.438553] device team_slave_0 entered promiscuous mode 19:51:58 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001940)=@base={0x3, 0x4, 0x4, 0x81}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, 0x0, &(0x7f00000000c0)=""/234}, 0x20) 19:51:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000680)=""/128, 0x1a, 0x80, 0x1}, 0x20) 19:51:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:58 executing program 3: syz_clone(0x30021100, 0x0, 0x40, 0x0, 0x0, 0x0) 19:51:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) recvmsg$unix(r0, &(0x7f0000003940)={&(0x7f0000000080), 0x6e, 0x0}, 0x2002) [ 1105.530635] device team0 left promiscuous mode [ 1105.548761] device team_slave_0 left promiscuous mode 19:51:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x0, 0x3}, {0x4}, {0xf}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000500)=""/237, 0x49, 0xed, 0x1}, 0x20) 19:51:58 executing program 5: syz_clone(0x500a7100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1105.580306] bridge0: port 12(team0) entered disabled state [ 1105.621909] 8021q: adding VLAN 0 to HW filter on device team0 [ 1105.647378] device team0 entered promiscuous mode [ 1105.677721] device team_slave_0 entered promiscuous mode [ 1105.695765] bond0: Enslaving team0 as an active interface with an up link [ 1105.699543] IPVS: ftp: loaded support on port[0] = 21 [ 1105.713165] validate_nla: 13 callbacks suppressed [ 1105.713173] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1105.736818] bond0: Releasing backup interface team0 [ 1105.744999] device team0 left promiscuous mode [ 1105.751111] device team_slave_0 left promiscuous mode 19:51:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001a000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x32}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff66}, 0x48) 19:51:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x39}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff66}, 0x48) 19:51:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x1, 0x0, 0x3}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x1, &(0x7f0000000040)=@raw=[@generic={0x33}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1105.864769] bridge0: port 12(team0) entered blocking state [ 1105.871974] bridge0: port 12(team0) entered disabled state [ 1105.878436] device team0 entered promiscuous mode [ 1105.883807] device team_slave_0 entered promiscuous mode 19:51:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x10, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:58 executing program 2: perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2250}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:51:58 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001940)=@base={0x3, 0x0, 0x4, 0x81, 0x4}, 0x48) 19:51:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x2, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1105.983615] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1105.999249] device team0 left promiscuous mode [ 1106.016668] device team_slave_0 left promiscuous mode 19:51:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001940)=@base={0x3, 0x4, 0x4, 0x81, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4300}, 0x48) 19:51:58 executing program 3: perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1106.050253] bridge0: port 12(team0) entered disabled state [ 1106.063686] 8021q: adding VLAN 0 to HW filter on device team0 [ 1106.102428] device team0 entered promiscuous mode [ 1106.121871] device team_slave_0 entered promiscuous mode [ 1106.137891] bond0: Enslaving team0 as an active interface with an up link 19:51:59 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0xa, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1106.155211] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1106.171911] bond0: Releasing backup interface team0 [ 1106.183853] device team0 left promiscuous mode [ 1106.198640] device team_slave_0 left promiscuous mode 19:51:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001d000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:51:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x9}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x700) recvmsg(r2, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x2000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 19:51:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40806685, &(0x7f0000000240)=0x1) 19:51:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001940)=@base={0x3, 0x4, 0x4, 0x81, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x600}, 0x48) 19:51:59 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='f2fs_write_begin\x00', r0}, 0x10) [ 1106.320891] bridge0: port 12(team0) entered blocking state [ 1106.326626] bridge0: port 12(team0) entered disabled state [ 1106.333490] device team0 entered promiscuous mode [ 1106.338387] device team_slave_0 entered promiscuous mode 19:51:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x2e}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff66}, 0x48) 19:51:59 executing program 4: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x2401, 0x0) 19:51:59 executing program 5: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x2400, 0x0) 19:51:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000003700)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002f80)="80", 0x1}, {&(0x7f0000003040)='?', 0x1}], 0x2, &(0x7f00000030c0)=[{0x18, 0x0, 0x0, "f9"}, {0x10}], 0x28}, 0x0) [ 1106.406037] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1106.444158] device team0 left promiscuous mode 19:51:59 executing program 3: syz_clone(0xa3200100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1106.488285] device team_slave_0 left promiscuous mode 19:51:59 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x2, &(0x7f0000000000)=@raw=[@alu={0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1106.533563] bridge0: port 12(team0) entered disabled state [ 1106.591999] 8021q: adding VLAN 0 to HW filter on device team0 [ 1106.641863] device team0 entered promiscuous mode [ 1106.661087] device team_slave_0 entered promiscuous mode [ 1106.667431] bond0: Enslaving team0 as an active interface with an up link [ 1106.679727] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1106.695783] bond0: Releasing backup interface team0 [ 1106.705162] device team0 left promiscuous mode [ 1106.711389] device team_slave_0 left promiscuous mode 19:51:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x0, 0x1}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:51:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1106.811556] bridge0: port 12(team0) entered blocking state [ 1106.817289] bridge0: port 12(team0) entered disabled state [ 1106.824401] device team0 entered promiscuous mode [ 1106.829248] device team_slave_0 entered promiscuous mode 19:52:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x62}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001e000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000003c0)}, 0x100) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) 19:52:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x11}, 0x48) 19:52:00 executing program 4: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x2401, 0x0) 19:52:00 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) 19:52:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x10, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5a}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:00 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xe, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r0, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 19:52:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=@base={0x1, 0x4, 0xf8a2, 0x6a, 0x11, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) [ 1107.323595] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1107.363585] device team0 left promiscuous mode [ 1107.407652] device team_slave_0 left promiscuous mode 19:52:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1107.434772] bridge0: port 12(team0) entered disabled state 19:52:00 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x16, 0x1, 0x0, 0x0}, 0x20) 19:52:00 executing program 4: perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1107.480510] 8021q: adding VLAN 0 to HW filter on device team0 [ 1107.496342] device team0 entered promiscuous mode [ 1107.519612] device team_slave_0 entered promiscuous mode [ 1107.561745] bond0: Enslaving team0 as an active interface with an up link [ 1107.592318] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1107.622843] bond0: Releasing backup interface team0 [ 1107.644715] device team0 left promiscuous mode [ 1107.661883] device team_slave_0 left promiscuous mode 19:52:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440021000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:00 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x2, 0x4, 0x31, 0x102}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000340)="ce7277d0637515d62ca288b80f04ead01405aacc2040629fcddc8aee800e793669d9c0f3124313f648589c83117c2aee8e11eb2977871a", 0xdb3b, r0}, 0x38) 19:52:00 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000000080)="cfda0ea0a64b5c26eb1b421903a7622c85e8c58c76e9749c7282742a8cd43ccd25f81e591f682d0e676ac46ec3ec0d07ada056e3ecdf22fc27b51fab6cb1b3", 0x3f}, {&(0x7f00000000c0)="8350b00e827fd6dc4f0ddf3b3443ab7a617729f82d7c89e8d10ec0da8f6cdb7160a7967ae476adfec5b31d8e9886b7da88f934417779dc5f707f5afa2bfd5dee7ad3e98147a14b05f0918a00e518747efc3a4bcff02a813f232f6cf4419cc766d99507e047f7e4f59c4282612d0de562dfda77fbfb50ed958139ec561b844a5fd70d6f453ba841e63a5bbcc5e8f62545ba35e49af2e1131325b99301d8039fe4ce2ee99f0d142032b9b7532c1233c212", 0xb0}, {&(0x7f00000002c0)="2fa08e750d163d7915ddce2c49be665bdc6ba1944393339477031b9fb00aab285b5a181cbe562af147850e1c535220a9fcf1c656440373144c7b2dd60083dc83b92460598538674b40356d94df6642566e3d997307d17422d329ba87ceaab678f02b1c14d11a6e8d4f474269002a3ed2968daec619243b5fe5821991c23c2fed8ce179535b6f9b70c379f0c8cafb130a3dee469199ebd46929b2a3efc8bcde7aa2c8a4981fccc9f7b490267b99fd52b4e3c5dc2aa99fe052dd51cc375ddeb594cbed22b28cdad898375fd0ac71a440e5624dbd0359a8e4830bd05432596a0c2a17c9173a8d", 0xe5}, {&(0x7f0000000180)="c24e89b811444294b04ba2e0fe530f7178544f16feb4fbf724fa3d5c96b8cab01d3363ec4b078674330682461d8343aa12095b53f571511fc4c1d0c6df198b59ec18ec782d3a60a7896d3d04fc4e6ef63acec50c9b4826b05f4f03f5d00f284138f378aaf8459385c33794db52dff974a760b0b41595d8db6f1dc2c0c1249f063112f994956e5102d416173856eb1d", 0x8f}, {&(0x7f0000000400)="cc2a2e8da1274632ff313a44b0109cb2a712b01c5c981a9b49e318ca33877ecb26911eaee8f22c3a15fcb14457851de7b15472186decfc219e81e82dac052bf73ca0dd11274be1604ec5fcb75fbae2492d3e9705753079429b20773ff86630bd17aa356bd9825cdc2a1c74d903dfae082e43ac2d538d71b9151d2a", 0x7b}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="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", 0xacb}], 0x7}, 0x0) close(r1) 19:52:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x2, 0x4, 0x31}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000080095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000340), 0xdb3b, r0}, 0x38) 19:52:00 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000a00)={&(0x7f0000000240)=@name={0x1e, 0x4}, 0x10, 0x0}, 0x0) 19:52:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000180)=""/215, 0x3b, 0xd7, 0x1}, 0x20) [ 1107.870394] bridge0: port 12(team0) entered blocking state [ 1107.876386] bridge0: port 12(team0) entered disabled state [ 1107.883905] device team0 entered promiscuous mode [ 1107.889037] device team_slave_0 entered promiscuous mode 19:52:00 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001740)=@bpf_lsm={0x1d, 0x3, &(0x7f0000001580)=@framed, &(0x7f0000001840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000001600), 0x8, 0x10, &(0x7f0000001640), 0x10, 0x0, 0x0, 0x0, &(0x7f0000001700)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0xa6) 19:52:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x33}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff66}, 0x48) 19:52:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x2}]}}, &(0x7f0000000180)=""/215, 0x32, 0xd7, 0x1}, 0x20) 19:52:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x2}, @func_proto]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000003c0)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) 19:52:00 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000a00)={&(0x7f0000000240)=@name={0x1e, 0x2, 0x0, {{0x1}}}, 0x10, 0x0}, 0x0) 19:52:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1108.063023] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1108.115094] device team0 left promiscuous mode [ 1108.146651] device team_slave_0 left promiscuous mode [ 1108.173298] bridge0: port 12(team0) entered disabled state [ 1108.209850] 8021q: adding VLAN 0 to HW filter on device team0 [ 1108.224792] device team0 entered promiscuous mode [ 1108.236630] device team_slave_0 entered promiscuous mode [ 1108.252544] bond0: Enslaving team0 as an active interface with an up link [ 1108.260198] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1108.272466] bond0: Releasing backup interface team0 [ 1108.278189] device team0 left promiscuous mode [ 1108.283512] device team_slave_0 left promiscuous mode 19:52:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440025000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:01 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)=""/144, 0x90}], 0x1, &(0x7f0000000380)=""/61, 0x3d}, 0x40) 19:52:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) 19:52:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x6, 0x0, 0x0) 19:52:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080)=0xffffffffffffffff, 0x12) 19:52:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000180)=""/215, 0x36, 0xd7, 0x1}, 0x20) [ 1108.445817] bridge0: port 12(team0) entered blocking state [ 1108.451694] bridge0: port 12(team0) entered disabled state [ 1108.458822] device team0 entered promiscuous mode [ 1108.464394] device team_slave_0 entered promiscuous mode 19:52:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:52:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x2, 0x4, 0x31, 0x102}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000340)="ce7277d0637515d62ca288b80f04ead01405aacc2040629fcddc8aee800e793669d9c0f3124313f648589c83117c2aee8e11eb2977871a", 0xdb3b, r0}, 0x38) 19:52:01 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 19:52:01 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) unlink(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) 19:52:01 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="189c64527700000420000000000000009500000000000000fb69da4dde0bc862998487bf07fde0b2234b6238408284766a0a9070dd919261fa688778efa90632d518f295c3cf3c1564683777348cd2faf683776b210c84a5f02b24c5200e7691a24f9c5d6a5e41e834030a421e449be0f81de20475cf1d6be145b899"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) [ 1108.565729] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1108.637482] device team0 left promiscuous mode 19:52:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map=0x1, 0xffffffffffffffff, 0x7}, 0x10) [ 1108.663322] device team_slave_0 left promiscuous mode [ 1108.693144] bridge0: port 12(team0) entered disabled state [ 1108.736456] 8021q: adding VLAN 0 to HW filter on device team0 [ 1108.755711] device team0 entered promiscuous mode [ 1108.761982] device team_slave_0 entered promiscuous mode [ 1108.775374] bond0: Enslaving team0 as an active interface with an up link [ 1108.796967] bond0: Releasing backup interface team0 [ 1108.817482] device team0 left promiscuous mode [ 1108.824789] device team_slave_0 left promiscuous mode 19:52:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440000200e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:01 executing program 4: r0 = syz_clone(0x40008000, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x3, 0x0, 0x9, 0x0, 0x80000001, 0x3a000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb2, 0x0, @perf_config_ext={0x800, 0x1000}, 0x0, 0x7fffffffffffffff, 0xfff, 0x0, 0x7, 0x7fff, 0x9, 0x0, 0x4, 0x0, 0x2}, r0, 0x3, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r2, 0x12) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0xc5, 0xfa, 0x8, 0x40, 0x0, 0x1, 0x35800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x6, 0x4}, 0x12000, 0x3, 0x3, 0x6, 0x3, 0x8, 0x6, 0x0, 0x8d9, 0x0, 0x7ff}, r0, 0xffffffffffffffff, r1, 0x0) 19:52:01 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) 19:52:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:52:01 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@id, 0x10, 0x0}, 0x0) 19:52:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x8, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="1800004001000000000000000900001003000000070000000000000005000000b7af08003400000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1108.957114] bridge0: port 12(team0) entered blocking state [ 1108.962898] bridge0: port 12(team0) entered disabled state [ 1108.970626] device team0 entered promiscuous mode [ 1108.975489] device team_slave_0 entered promiscuous mode 19:52:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) 19:52:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0x4, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x61]}}, &(0x7f00000003c0)=""/4096, 0x2f, 0x1000, 0x1}, 0x20) 19:52:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) close(r0) 19:52:01 executing program 5: socketpair(0xa, 0x1, 0x9, &(0x7f0000000080)) [ 1109.100888] device team0 left promiscuous mode [ 1109.113786] IPVS: ftp: loaded support on port[0] = 21 [ 1109.126878] device team_slave_0 left promiscuous mode 19:52:02 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000240)=@l2tp6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0, 0x0, &(0x7f0000000c40)=ANY=[], 0x140}, 0x0) [ 1109.160183] bridge0: port 12(team0) entered disabled state [ 1109.191629] 8021q: adding VLAN 0 to HW filter on device team0 19:52:02 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1}, 0x0) close(r1) [ 1109.225668] device team0 entered promiscuous mode [ 1109.244864] device team_slave_0 entered promiscuous mode [ 1109.268068] bond0: Enslaving team0 as an active interface with an up link [ 1109.302653] bond0: Releasing backup interface team0 [ 1109.308277] device team0 left promiscuous mode [ 1109.319694] device team_slave_0 left promiscuous mode 19:52:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090800000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1109.472608] bridge0: port 12(team0) entered blocking state [ 1109.478306] bridge0: port 12(team0) entered disabled state [ 1109.485510] device team0 entered promiscuous mode [ 1109.490986] device team_slave_0 entered promiscuous mode [ 1109.542810] device team0 left promiscuous mode [ 1109.547970] device team_slave_0 left promiscuous mode [ 1109.556402] bridge0: port 12(team0) entered disabled state [ 1109.566120] 8021q: adding VLAN 0 to HW filter on device team0 [ 1109.573962] device team0 entered promiscuous mode [ 1109.579107] device team_slave_0 entered promiscuous mode [ 1109.586932] bond0: Enslaving team0 as an active interface with an up link [ 1109.598171] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 19:52:02 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)=""/144, 0x90}], 0x1, 0x0, 0x1000000}, 0x0) 19:52:02 executing program 3: bpf$BPF_PROG_DETACH(0x10, &(0x7f0000000000)={@map=0x1, 0xffffffffffffffff, 0x25}, 0x10) 19:52:02 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map=0x1, 0xffffffffffffffff, 0x11}, 0x10) 19:52:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) recvmsg$unix(r1, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xe8}, 0x40) 19:52:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000140)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r1, 0x123, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r2, 0x4) 19:52:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400092400000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:02 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) r3 = openat$cgroup_ro(r0, &(0x7f0000000600)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000580)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@cgroup, r3, 0x29}, 0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000380)="5bf2d81280d8981dcede3f002d624fb5b9cfd5a651506ae2", 0x18, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 19:52:02 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f00000026c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="ea", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)=""/144, 0x90}], 0x1}, 0x0) 19:52:02 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000020c0)={0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001cc0)="02", 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000680)=""/158, 0x9e}], 0x1}, 0x0) 19:52:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_exit\x00'}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map=0x1, 0xffffffffffffffff, 0x10}, 0x10) 19:52:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6}, {0x0, 0x4}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000180)=""/215, 0x3c, 0xd7, 0x1}, 0x20) 19:52:02 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="1800004001000000000000000900000018000000070000000000000005000000b7af08003400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:02 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000340)={&(0x7f0000000000)=@id, 0x10, &(0x7f0000000880), 0x9, 0x0, 0xffffffffffffff8f}, 0x0) 19:52:02 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_freezer_state(r0, 0x0, 0x0) 19:52:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000cc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000dc0)=""/241, 0x32, 0xf1, 0x1}, 0x20) 19:52:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x4}]}]}}, &(0x7f0000000180)=""/215, 0x36, 0xd7, 0x1}, 0x20) 19:52:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x8, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0x8, 0x4}, {0x6}, {0x1}, {0x8}, {}, {}, {0x1, 0x4}]}]}, {0x0, [0x3e, 0x61, 0x2e, 0x61, 0x41, 0x0]}}, &(0x7f0000000180)=""/215, 0x64, 0xd7, 0x1}, 0x20) 19:52:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090003000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:52:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@var={0x4, 0x0, 0x0, 0xe, 0x2}, @typedef={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x0, 0x61]}}, &(0x7f00000003c0)=""/4096, 0x3c, 0x1000, 0x1}, 0x20) 19:52:02 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) openat$cgroup_ro(r0, &(0x7f0000000600)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000580)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_clone(0x94105780, &(0x7f0000000380)="5bf2d81280d8981dcede3f002d624fb5b9cfd5a651506ae2db9c001b517393b44d2ea40d7b09dec10d04e139", 0x2c, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:52:02 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) write$cgroup_int(r0, 0x0, 0x0) 19:52:02 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x8, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="1810004001000000000001000900000018000000070000000000000005000000b7af08003400000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1110.109025] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 19:52:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x8, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:52:03 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000180)=""/200, 0x26, 0xc8, 0x1}, 0x20) close(r0) 19:52:03 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000020c0)={0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001cc0)="02", 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000680)=""/158, 0x9e}], 0x1, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) [ 1110.199699] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 19:52:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}]}, @array, @typedef]}}, &(0x7f0000000180)=""/215, 0x52, 0xd7, 0x1}, 0x20) 19:52:03 executing program 4: bpf$BPF_PROG_DETACH(0x23, &(0x7f0000000000)={@map=0x1, 0xffffffffffffffff, 0x25}, 0x10) 19:52:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@typedef={0x6, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f00000003c0)=""/4096, 0x2c, 0x1000, 0x1}, 0x20) 19:52:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009020e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:03 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 19:52:03 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{}, 0x1}}, 0x80, 0x0}, 0x0) 19:52:03 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_clone(0x8008200, 0x0, 0x0, 0x0, 0x0, 0x0) 19:52:03 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)=""/144, 0x90}], 0x1}, 0x40) 19:52:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000080095"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000009c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_exit\x00', r1}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200), 0x8) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) [ 1110.428777] bond0: Releasing backup interface team0 [ 1110.443992] device team0 left promiscuous mode 19:52:03 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000080095"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000009c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map=0x1, 0xffffffffffffffff, 0x5}, 0x10) [ 1110.472263] device team_slave_0 left promiscuous mode 19:52:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x14}, 0x48) 19:52:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x5a61, 0x3ff, 0x5}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, r0, 0x4}, 0x38) [ 1110.505101] bridge0: port 12(team0) entered blocking state [ 1110.528825] bridge0: port 12(team0) entered disabled state 19:52:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x0, 0x0, 0x0, 0x4}, 0x48) [ 1110.569503] device team0 entered promiscuous mode [ 1110.586817] device team_slave_0 entered promiscuous mode 19:52:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000004c0)=ANY=[], 0x4) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x320, 0x23fe00) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002980)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e011030029000505d25a80648c63940d0424fc60100011400a2f0000093582c137153e3708480c8002000000d1bd", 0x33fe0}], 0x1}, 0x0) 19:52:03 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 19:52:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009030e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:03 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x5, &(0x7f0000000080)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @func]}, &(0x7f0000000100)='syzkaller\x00', 0x1, 0x91, &(0x7f00000001c0)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x9, 0x401, 0x101, 0x3}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={0x0, r0}, 0x10) 19:52:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@typedef={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000140)=""/221, 0x27, 0xdd, 0x1}, 0x20) 19:52:03 executing program 1: syz_clone(0x1c289080, 0x0, 0x0, 0x0, 0x0, 0x0) 19:52:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x5a61, 0x3ff, 0x401, 0x4}, 0x48) [ 1110.782999] netlink: 182708 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1110.785881] validate_nla: 8 callbacks suppressed [ 1110.785890] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xfffff1e4}]}]}}, &(0x7f0000002a00)=""/4101, 0x32, 0x1005, 0x1}, 0x20) 19:52:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x5a61, 0x3ff, 0x5}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000000), 0x0}, 0x20) 19:52:03 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) syz_clone(0x41009000, 0x0, 0x0, 0x0, 0x0, 0x0) 19:52:03 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000042c0)={0x0, 0x0, 0x0}, 0x24044050) [ 1110.909770] device team0 left promiscuous mode 19:52:03 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x5a61, 0x3ff, 0x5}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x20) [ 1110.949576] device team_slave_0 left promiscuous mode 19:52:03 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) [ 1110.988492] bridge0: port 12(team0) entered disabled state [ 1111.010248] IPVS: ftp: loaded support on port[0] = 21 [ 1111.029534] 8021q: adding VLAN 0 to HW filter on device team0 [ 1111.078034] device team0 entered promiscuous mode [ 1111.101726] device team_slave_0 entered promiscuous mode [ 1111.115077] bond0: Enslaving team0 as an active interface with an up link [ 1111.123028] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1111.136510] bond0: Releasing backup interface team0 [ 1111.147871] device team0 left promiscuous mode [ 1111.164152] device team_slave_0 left promiscuous mode 19:52:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009040e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:04 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="96", 0x1}], 0x1}, 0x0) 19:52:04 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x3ff}, 0x48) 19:52:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, &(0x7f00000003c0)=""/181, 0x2a, 0xb5, 0x1}, 0x20) 19:52:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x5a61, 0x3ff, 0x5}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, r0, 0x4}, 0x38) [ 1111.373319] bridge0: port 12(team0) entered blocking state [ 1111.379119] bridge0: port 12(team0) entered disabled state [ 1111.386020] device team0 entered promiscuous mode [ 1111.391363] device team_slave_0 entered promiscuous mode 19:52:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000002a00)=""/4101, 0x32, 0x1005, 0x1}, 0x20) 19:52:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x17, 0x0, 0x806, 0x6}, 0x48) 19:52:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1111.508058] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1111.528661] device team0 left promiscuous mode [ 1111.542624] device team_slave_0 left promiscuous mode [ 1111.554538] bridge0: port 12(team0) entered disabled state [ 1111.585520] 8021q: adding VLAN 0 to HW filter on device team0 [ 1111.602635] device team0 entered promiscuous mode [ 1111.610624] device team_slave_0 entered promiscuous mode [ 1111.616934] bond0: Enslaving team0 as an active interface with an up link [ 1111.633426] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1111.653823] bond0: Releasing backup interface team0 [ 1111.664759] device team0 left promiscuous mode [ 1111.672063] device team_slave_0 left promiscuous mode [ 1111.888482] bridge0: port 12(team0) entered blocking state [ 1111.896027] bridge0: port 12(team0) entered disabled state [ 1111.907678] device team0 entered promiscuous mode [ 1111.917173] device team_slave_0 entered promiscuous mode 19:52:05 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:52:05 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x2600}, 0xc) 19:52:05 executing program 5: perf_event_open(&(0x7f0000001240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x42620}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:52:05 executing program 3: bpf$MAP_CREATE(0x0, 0xfffffffffffffffc, 0x0) 19:52:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009050e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:05 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@txtime={{0xf}}], 0x18}, 0x0) 19:52:05 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 19:52:05 executing program 1: syz_clone(0xad0a9000, 0x0, 0x0, 0x0, 0x0, 0x0) 19:52:05 executing program 4: mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:52:05 executing program 3: fchmodat(0xffffffffffffff9c, 0x0, 0x0) 19:52:05 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x14, 0x0, 0x0) [ 1112.989903] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1113.003262] device team0 left promiscuous mode [ 1113.008024] device team_slave_0 left promiscuous mode [ 1113.015079] bridge0: port 12(team0) entered disabled state 19:52:05 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000001140)=[{&(0x7f0000000040)='^', 0x1}, {&(0x7f0000000100)="83", 0x1}, {&(0x7f0000000140)="dd", 0x1}], 0x3) 19:52:05 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000001140)=[{0x0}, {&(0x7f0000000100)="83", 0x1}, {&(0x7f0000000140)="dd", 0x1}], 0x3) 19:52:05 executing program 1: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)="9d", 0x1) [ 1113.071815] 8021q: adding VLAN 0 to HW filter on device team0 19:52:05 executing program 3: fchown(0xffffffffffffff9c, 0xffffffffffffffff, 0xffffffffffffffff) [ 1113.112901] device team0 entered promiscuous mode 19:52:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) readv(r1, &(0x7f0000001300), 0x4) [ 1113.141855] device team_slave_0 entered promiscuous mode [ 1113.164286] bond0: Enslaving team0 as an active interface with an up link [ 1113.212313] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1113.224985] bond0: Releasing backup interface team0 [ 1113.236793] device team0 left promiscuous mode [ 1113.244230] device team_slave_0 left promiscuous mode 19:52:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009060e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000003c0), 0x10, 0x8) 19:52:06 executing program 2: fchmodat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 19:52:06 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000001140)=[{0x0}, {0x0}, {&(0x7f0000000140)="dd", 0x1}], 0x3) 19:52:06 executing program 3: ftruncate(0xffffffffffffffff, 0x0) 19:52:06 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000002980)={0x0, 0x0, 0x0}, 0x0) [ 1113.353705] bridge0: port 12(team0) entered blocking state [ 1113.359515] bridge0: port 12(team0) entered disabled state [ 1113.366028] device team0 entered promiscuous mode [ 1113.370957] device team_slave_0 entered promiscuous mode 19:52:06 executing program 5: mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:52:06 executing program 1: bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x0, 0x0, 0x2}, 0x8) 19:52:06 executing program 3: writev(0xffffffffffffffff, &(0x7f0000001140)=[{0x0}], 0x1) 19:52:06 executing program 4: fchmodat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 19:52:06 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000001140)=[{&(0x7f0000000040)='^', 0x1}, {0x0}, {&(0x7f0000000140)="dd", 0x1}], 0x3) 19:52:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) execve(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1113.452102] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1113.463828] device team0 left promiscuous mode [ 1113.476291] device team_slave_0 left promiscuous mode [ 1113.492274] bridge0: port 12(team0) entered disabled state [ 1113.535966] 8021q: adding VLAN 0 to HW filter on device team0 [ 1113.547413] device team0 entered promiscuous mode [ 1113.564771] device team_slave_0 entered promiscuous mode [ 1113.575591] bond0: Enslaving team0 as an active interface with an up link [ 1113.587257] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1113.598291] bond0: Releasing backup interface team0 [ 1113.607909] device team0 left promiscuous mode [ 1113.614825] device team_slave_0 left promiscuous mode 19:52:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009070e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:06 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000001140)=[{&(0x7f0000000040)='^', 0x1}, {&(0x7f0000000140)="dd", 0x1}], 0x2) 19:52:06 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000001140)=[{&(0x7f0000000040)="5e9ed1303cbdd0377976b627de282ca917e29e56c3d59bfc3984fb207b0d153c99c0b32591687a1bb574d112ff292fba1f412b662ba99994b79de9251264ab80f5eb94143ec6dd4150142587687dc2878b4ce2d4d85e6e6d8ea325f6866a5a1cdbb7935369d8fec937bef27ad2591857b47f07d81d941f3ae988e0b3fa305a7b4e0ab1175445d0da939889cf778e4404fe35cccdfe71dcc4bb247957a2d853d7232be4a643559b6f0f4d3c32795a953b7762f777643cc361e37f2505", 0xbc}, {&(0x7f0000000100)="83906bacf610ff4b6cc1991e1f5eab1565cbc4034f3f87f9c3", 0x19}, {&(0x7f0000000140)="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", 0xf2c}], 0x3) 19:52:06 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000001140)=[{&(0x7f0000000040)="5e9ed130", 0x4}], 0x1) 19:52:06 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0xa) 19:52:06 executing program 3: fchmodat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) [ 1113.711808] bridge0: port 12(team0) entered blocking state [ 1113.717506] bridge0: port 12(team0) entered disabled state [ 1113.724717] device team0 entered promiscuous mode [ 1113.729634] device team_slave_0 entered promiscuous mode 19:52:06 executing program 2: mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/111) 19:52:06 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 19:52:06 executing program 1: socket(0x18, 0x1, 0x0) 19:52:06 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) lseek(r0, 0x0, 0x10000) 19:52:06 executing program 4: socketpair$unix(0x2, 0x1, 0x0, 0x0) 19:52:06 executing program 1: socketpair$unix(0x190, 0x0, 0x0, 0x0) [ 1113.793613] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1113.821759] device team0 left promiscuous mode [ 1113.834765] device team_slave_0 left promiscuous mode [ 1113.862629] bridge0: port 12(team0) entered disabled state [ 1113.912439] 8021q: adding VLAN 0 to HW filter on device team0 [ 1113.920769] device team0 entered promiscuous mode [ 1113.926036] device team_slave_0 entered promiscuous mode [ 1113.938456] bond0: Enslaving team0 as an active interface with an up link [ 1113.953400] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1113.965648] bond0: Releasing backup interface team0 [ 1113.971969] device team0 left promiscuous mode [ 1113.976757] device team_slave_0 left promiscuous mode 19:52:06 executing program 3: mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3) 19:52:06 executing program 2: mlock(&(0x7f0000ff7000/0x9000)=nil, 0x9000) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 19:52:06 executing program 5: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 19:52:06 executing program 4: pipe2(&(0x7f0000000700), 0x0) getrlimit(0x0, &(0x7f0000000000)) 19:52:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009080e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:06 executing program 1: socketpair$unix(0x2, 0x0, 0x2, 0x0) [ 1114.080626] bridge0: port 12(team0) entered blocking state [ 1114.086303] bridge0: port 12(team0) entered disabled state [ 1114.093547] device team0 entered promiscuous mode [ 1114.098395] device team_slave_0 entered promiscuous mode 19:52:07 executing program 3: madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 19:52:07 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) lseek(r0, 0x0, 0x0) 19:52:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={&(0x7f00000000c0)=@abs={0xa6d08026ef3febb5}, 0x8, &(0x7f0000000300)=[{&(0x7f0000000100)="dc024353b2e5ea925790cf207c6dc07b0359f2f9a126fade4db72062258d3349398ba96e03f2906546057b6fa6d8dc26d04e3717a85124ba56177f74cb5e3e08f3f3596ee8dd7e6cb23d650edaf871b2f959c8d2c3e2633c06a157c93b24df9b4afd0b226b54b8b7fcb4d1dc8cbb4ff8c9c0921123edc66256639d0aba97b0224f9d23dcb783b374c57002fe1756e3c5747b6edfd1509106c6d5ff489ff3d9e3f0a1f3db9f7333859764ef47284fcf367e94dfe54e62bd1e5ffd4296628b4712a2485b53f6b0776a987756708f51", 0xce}, {&(0x7f0000000200)="95c712d78f1dfd1ec68c8e72fb25a1ed20004b75f4eb327cc162e282ec1a83c9be4d19ea81a9e7f656143277881b873be6b58f35751288eb92dadc1c3c42a5f13f240f358ac42311bbb0bf8cd21435461de5956dfa8ea6a30ab59e853a34ee122f02609b175bb1e43f2d8720171a0dde342ccd933cc4d19cd02dd4bd9a7446edd432a080adf7f41de9abdf3303e38de9d7cc508d4c9f4634720216552a0ada2e56dcc1bdb3190d061d2f06baa58c06343987feea78c1ff425f885fdbcdbea614635bd7", 0xc3}], 0x2, &(0x7f0000000340)=[@cred], 0x20}, 0x1) 19:52:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000003c0), 0x10, 0x8) 19:52:07 executing program 5: fchownat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x200) 19:52:07 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) 19:52:07 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x50e00, 0x72ae1c28cf103f6b) [ 1114.168566] device team0 left promiscuous mode [ 1114.181651] device team_slave_0 left promiscuous mode [ 1114.203928] bridge0: port 12(team0) entered disabled state 19:52:07 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000080)="a9", 0x1}, {0x0}], 0x2, &(0x7f0000001380)=[{0x10}], 0x10}, 0x0) 19:52:07 executing program 5: munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 19:52:07 executing program 3: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000004c0)={{}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) [ 1114.272444] 8021q: adding VLAN 0 to HW filter on device team0 [ 1114.322344] device team0 entered promiscuous mode [ 1114.336634] device team_slave_0 entered promiscuous mode [ 1114.359220] bond0: Enslaving team0 as an active interface with an up link [ 1114.374874] bond0: Releasing backup interface team0 [ 1114.381651] device team0 left promiscuous mode [ 1114.389090] device team_slave_0 left promiscuous mode 19:52:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090a0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:07 executing program 4: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 19:52:07 executing program 1: mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 19:52:07 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) pipe2(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup3(r1, r0, 0x0) 19:52:07 executing program 5: r0 = socket(0x18, 0x3, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000080)) 19:52:07 executing program 3: syz_emit_ethernet(0xe, &(0x7f00000011c0)={@local, @empty, @val, {@generic={0x8863}}}, 0x0) [ 1114.490338] bridge0: port 12(team0) entered blocking state [ 1114.496063] bridge0: port 12(team0) entered disabled state [ 1114.503945] device team0 entered promiscuous mode [ 1114.509208] device team_slave_0 entered promiscuous mode 19:52:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f00000003c0)="a4", 0x1}, {&(0x7f0000000400)='o', 0x1}], 0x3}, 0x0) 19:52:07 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)}, 0x0) 19:52:07 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0xb4e5cc7ccf7fca22, 0x0) 19:52:07 executing program 3: poll(&(0x7f00000000c0)=[{}, {}, {}], 0x4e8, 0x0) [ 1114.600832] device team0 left promiscuous mode 19:52:07 executing program 4: setitimer(0x0, &(0x7f0000000000)={{0x400000000000000}}, 0x0) 19:52:07 executing program 2: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) [ 1114.624639] device team_slave_0 left promiscuous mode [ 1114.658036] bridge0: port 12(team0) entered disabled state [ 1114.690279] 8021q: adding VLAN 0 to HW filter on device team0 [ 1114.707287] device team0 entered promiscuous mode [ 1114.713492] device team_slave_0 entered promiscuous mode [ 1114.723019] bond0: Enslaving team0 as an active interface with an up link [ 1114.734025] bond0: Releasing backup interface team0 [ 1114.742266] device team0 left promiscuous mode [ 1114.746879] device team_slave_0 left promiscuous mode 19:52:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090c0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000020c0)) 19:52:07 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unlinkat(r0, &(0x7f0000000340)='./file0\x00', 0x8) 19:52:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000015c0)={&(0x7f0000000040)=@abs, 0x8, &(0x7f0000001500)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 19:52:07 executing program 2: mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:52:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x3}, 0x8, 0x0}, 0x0) [ 1114.854851] bridge0: port 12(team0) entered blocking state [ 1114.860718] bridge0: port 12(team0) entered disabled state [ 1114.867148] device team0 entered promiscuous mode [ 1114.872392] device team_slave_0 entered promiscuous mode 19:52:07 executing program 3: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 19:52:07 executing program 5: shmctl$SHM_UNLOCK(0xffffffffffffffff, 0x4) 19:52:07 executing program 1: mlock(&(0x7f0000fee000/0x12000)=nil, 0x12000) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) [ 1114.931971] device team0 left promiscuous mode 19:52:07 executing program 2: nanosleep(&(0x7f0000000000)={0x0, 0x80000000}, 0x0) 19:52:07 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) [ 1114.965698] device team_slave_0 left promiscuous mode 19:52:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r1, r0) [ 1114.987108] bridge0: port 12(team0) entered disabled state [ 1115.022582] 8021q: adding VLAN 0 to HW filter on device team0 [ 1115.047289] device team0 entered promiscuous mode [ 1115.072419] device team_slave_0 entered promiscuous mode [ 1115.087088] bond0: Enslaving team0 as an active interface with an up link [ 1115.098965] bond0: Releasing backup interface team0 [ 1115.110957] device team0 left promiscuous mode [ 1115.116012] device team_slave_0 left promiscuous mode 19:52:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090e0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:08 executing program 1: syz_emit_ethernet(0x1fbf, &(0x7f0000000080)={@broadcast, @random="72e33f093452", @val, {@ipv6}}, 0x0) 19:52:08 executing program 3: r0 = socket(0x2, 0x1, 0x0) connect$unix(r0, &(0x7f0000001280)=ANY=[@ANYBLOB="8a022a2f66"], 0x10) 19:52:08 executing program 4: socket$inet6(0x18, 0x3, 0x8) 19:52:08 executing program 5: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 19:52:08 executing program 2: socket$unix(0x1, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4) [ 1115.216797] bridge0: port 12(team0) entered blocking state [ 1115.222620] bridge0: port 12(team0) entered disabled state [ 1115.231417] device team0 entered promiscuous mode [ 1115.237454] device team_slave_0 entered promiscuous mode 19:52:08 executing program 1: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) 19:52:08 executing program 3: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{}, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 19:52:08 executing program 5: syz_emit_ethernet(0x13bf, &(0x7f0000000080)={@broadcast, @random="72e33f093452", @val, {@ipv6}}, 0x0) 19:52:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f00000011c0), &(0x7f00000000c0)=0x1006) 19:52:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000000040)) [ 1115.324778] device team0 left promiscuous mode [ 1115.350420] device team_slave_0 left promiscuous mode 19:52:08 executing program 3: r0 = socket(0x18, 0x1, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000080)) [ 1115.372956] bridge0: port 12(team0) entered disabled state [ 1115.424707] 8021q: adding VLAN 0 to HW filter on device team0 [ 1115.446818] device team0 entered promiscuous mode [ 1115.465661] device team_slave_0 entered promiscuous mode [ 1115.483357] bond0: Enslaving team0 as an active interface with an up link [ 1115.493185] bond0: Releasing backup interface team0 [ 1115.499289] device team0 left promiscuous mode [ 1115.503889] device team_slave_0 left promiscuous mode 19:52:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009100e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:08 executing program 1: socket(0x20, 0x0, 0x53) 19:52:08 executing program 4: accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000080)) getrusage(0xffffffffffffffff, &(0x7f00000001c0)) 19:52:08 executing program 5: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ff0000/0x10000)=nil, 0x10000) 19:52:08 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 19:52:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x2}, 0xc) [ 1115.616491] bridge0: port 12(team0) entered blocking state [ 1115.622202] bridge0: port 12(team0) entered disabled state [ 1115.628967] device team0 entered promiscuous mode [ 1115.633835] device team_slave_0 entered promiscuous mode 19:52:08 executing program 3: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 19:52:08 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) sendto$inet(r0, 0x0, 0xfffffd02, 0x0, &(0x7f0000000040)={0x2, 0x1}, 0xc) 19:52:08 executing program 5: clock_getres(0x3, &(0x7f0000000940)) [ 1115.684811] device team0 left promiscuous mode [ 1115.693365] device team_slave_0 left promiscuous mode [ 1115.703660] bridge0: port 12(team0) entered disabled state 19:52:08 executing program 4: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 19:52:08 executing program 5: getgroups(0x7, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]) 19:52:08 executing program 3: accept$inet6(0xffffffffffffffff, &(0x7f0000000600), 0x0) [ 1115.786188] 8021q: adding VLAN 0 to HW filter on device team0 [ 1115.842272] device team0 entered promiscuous mode [ 1115.860286] device team_slave_0 entered promiscuous mode [ 1115.877002] bond0: Enslaving team0 as an active interface with an up link [ 1115.890928] validate_nla: 9 callbacks suppressed [ 1115.890943] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1115.929179] bond0: Releasing backup interface team0 [ 1115.934779] device team0 left promiscuous mode [ 1115.941493] device team_slave_0 left promiscuous mode 19:52:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009180e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) chroot(&(0x7f0000000140)='./file0\x00') mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:52:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000012c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000001340)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 19:52:08 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000002040)=@base={0x18}, 0x48) 19:52:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc5, &(0x7f00000000c0)=""/197, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x2, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001a40)=""/235, 0x28, 0xeb, 0x1}, 0x20) [ 1116.052655] bridge0: port 12(team0) entered blocking state [ 1116.058369] bridge0: port 12(team0) entered disabled state [ 1116.065408] device team0 entered promiscuous mode [ 1116.070729] device team_slave_0 entered promiscuous mode 19:52:09 executing program 4: unlink(&(0x7f0000000140)='./file0\x00') 19:52:09 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x284001, 0x0) 19:52:09 executing program 3: bpf$LINK_GET_FD_BY_ID(0x3, 0x0, 0xfffffffffffffe5c) syz_clone(0x40000000, 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)="9c65a1e76b517eeb658e28b2d4db09ea7067ea830dc2cb6212426c04043908f4bd6899c7ea65ce346df4b1286b9b6fb565ca729374cf") 19:52:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}], 0x2, &(0x7f0000000680)=[{0xe8, 0x119, 0x0, "361f8462c974835d67b4c00aaa9c9bca5d148e1befe6857721fd54f2464586eb68998c9e33f45927e5bd0a277df6925d9d8d1f89879c4245682c2632806c3c1c962f1a2526b32778d38cdbfa633e20c11d446ed6791368f2a9dedcae26cca500dbe6c032c7d3dac3140616f3050e6f239449cf080def8c8aa537ac3cd2b21143b0b4af1596a1e7a38ea3ded66e220dbe94c146e8d5d3baa9fa839a166658bf994f7fc1bfb52a5998b1910c1843aff7f81356e287d891c714c08d10ab47c125eda5cd58733127d41ea59459ca8be015beddcfee4233"}], 0xe8}, 0x20080) 19:52:09 executing program 1: bpf$LINK_GET_FD_BY_ID(0x3, 0x0, 0xfffffffffffffe5c) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r0}, 0x8) syz_clone(0x40000000, &(0x7f0000000240)="f442df506a7d6484c94822d256c3d48da9c010c4becc407a8025faa1145480b5b11d1748edca25c6238c8ea53999c294b9ad0ad60604d88dc31a645890e5836569f30b7122c437a11c840907e972e7b4cfc448f0a59707e55f4ea484a7e9c1fbcd1b3e04e02f5f02aa88bec2f03f64705594a8253f4cda06b8c3fc6b2ceabaa0f62ef2590966cd553901530f3d2000dd00727964e18eda8ab608b2baedb3f1824bf5f30f2ad834791b1a5381b98389117997e4ccb87b7a6de8629df552698db4e89d4e386726ce1540825b2b1cf47487d49cee49b7f4dcffcf9c76ce7c8c26df0daf219a0b575d177235", 0xea, &(0x7f0000000100), &(0x7f0000000000), &(0x7f0000000180)="9c65a1e76b517eeb658e28b2d4db09ea7067ea830dc2cb6212426c04043908f4bd6899c7ea65ce346df4b1286b9b6fb565ca729374cfe7fab4ff8678784057bae764f563f39a0985") bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000000c0)={r1, r1, 0xd}, 0x10) [ 1116.138667] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1116.176094] device team0 left promiscuous mode [ 1116.202020] device team_slave_0 left promiscuous mode 19:52:09 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={0x0, 0x0, 0x8}, 0x10) [ 1116.232426] bridge0: port 12(team0) entered disabled state [ 1116.275506] 8021q: adding VLAN 0 to HW filter on device team0 [ 1116.279645] IPVS: ftp: loaded support on port[0] = 21 [ 1116.294933] device team0 entered promiscuous mode [ 1116.310015] IPVS: ftp: loaded support on port[0] = 21 [ 1116.315721] device team_slave_0 entered promiscuous mode [ 1116.335625] bond0: Enslaving team0 as an active interface with an up link [ 1116.345117] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1116.358311] bond0: Releasing backup interface team0 [ 1116.365538] device team0 left promiscuous mode [ 1116.374145] device team_slave_0 left promiscuous mode 19:52:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009600e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000880)={&(0x7f0000000480)=@isdn, 0x31, &(0x7f0000000640)=[{0x0}, {0x0}], 0x2, &(0x7f0000000000)=[{0x18, 0x0, 0x0, "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"}, {0x21}], 0x28}, 0x0) 19:52:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:52:09 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdir(&(0x7f0000000a40)='./file0\x00', 0x0) [ 1116.474999] bridge0: port 12(team0) entered blocking state [ 1116.480735] bridge0: port 12(team0) entered disabled state [ 1116.487114] device team0 entered promiscuous mode [ 1116.492437] device team_slave_0 entered promiscuous mode 19:52:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1}]}]}}, &(0x7f0000000080)=""/177, 0x36, 0xb1, 0x1}, 0x20) 19:52:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f00000001c0)=@framed={{}, [], {0x95, 0x0, 0x0, 0x4}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xbf, &(0x7f00000000c0)=""/191, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:09 executing program 4: perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:52:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc5, &(0x7f00000000c0)=""/197, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1116.606748] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1116.619690] device team0 left promiscuous mode [ 1116.634043] device team_slave_0 left promiscuous mode [ 1116.667243] bridge0: port 12(team0) entered disabled state [ 1116.683582] 8021q: adding VLAN 0 to HW filter on device team0 [ 1116.703218] device team0 entered promiscuous mode [ 1116.710822] device team_slave_0 entered promiscuous mode [ 1116.724965] bond0: Enslaving team0 as an active interface with an up link [ 1116.741410] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1116.750229] bond0: Releasing backup interface team0 [ 1116.755736] device team0 left promiscuous mode [ 1116.761798] device team_slave_0 left promiscuous mode [ 1116.867395] bridge0: port 12(team0) entered blocking state [ 1116.873195] bridge0: port 12(team0) entered disabled state [ 1116.881160] device team0 entered promiscuous mode [ 1116.886012] device team_slave_0 entered promiscuous mode 19:52:09 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, 0x48) 19:52:09 executing program 2: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffa9c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:52:09 executing program 5: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) 19:52:09 executing program 4: bpf$LINK_GET_FD_BY_ID(0x3, 0x0, 0xfffffffffffffe5c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) syz_clone(0x40000000, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000180)="9c65a1e76b517eeb658e28b2d4db09ea7067ea830dc2cb6212426c04043908f4bd68") 19:52:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090018000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:09 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) mkdir(&(0x7f0000000a40)='./file0\x00', 0x0) [ 1116.950422] ieee802154 phy0 wpan0: encryption failed: -22 [ 1116.956036] ieee802154 phy1 wpan1: encryption failed: -22 19:52:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x2}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001a40)=""/235, 0x28, 0xeb, 0x1}, 0x20) 19:52:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/ipc\x00') [ 1117.025128] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1117.063100] IPVS: ftp: loaded support on port[0] = 21 19:52:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2, 0x4}]}]}, {0x0, [0x0]}}, &(0x7f0000000180)=""/215, 0x2f, 0xd7, 0x1}, 0x20) [ 1117.079470] device team0 left promiscuous mode 19:52:09 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000038c0)={0x0, 0x0, &(0x7f00000027c0)=[{0x0}, {0x0}, {0xfffffffffffffffc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 19:52:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {&(0x7f0000000380)="b8e8", 0x2}], 0x2}, 0x20048041) [ 1117.103562] device team_slave_0 left promiscuous mode 19:52:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1117.144231] bridge0: port 12(team0) entered disabled state 19:52:10 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x400142, 0x0) 19:52:10 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c00)={0xffffffffffffffff, 0x0, 0x18}, 0xc) 19:52:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x8, 0x3, 0x0, &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1117.212728] 8021q: adding VLAN 0 to HW filter on device team0 [ 1117.237014] device team0 entered promiscuous mode [ 1117.280864] device team_slave_0 entered promiscuous mode [ 1117.297160] bond0: Enslaving team0 as an active interface with an up link [ 1117.308001] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 19:52:10 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x0, 0x3, 0x0, &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:10 executing program 5: syz_clone(0x40800200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)="1de109bc11de1e634cad0bafd42335387a7f2584ad3fc04c71bf0445063c4b137266c50ec652038b8eee103ee142dce5042b1dfda80b6d0a41b206601c1ee6") 19:52:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x9, 0x3, 0x0, &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:10 executing program 3: socketpair(0xa, 0x3, 0x5, &(0x7f0000000040)) 19:52:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090020000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000025) 19:52:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/137, 0x89}], 0x300}, 0x0) sendmsg$inet(r1, &(0x7f0000001040)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001080)="890302c58373d838af67223c55db4d12f38f7b89bcfd785abf0b38908f0bbf484c5900ef2292f043ae965bd96141e8ac0e431d88e07645f5d81e695ec607035a4d9737409d7e73531df29ac3f7e9beaed63b9230e88d6995c17edfc43eb7c8f91381f43a211d2280a876185471e16717cebab9b2a7be9c01caa38cc07a656d474016c16164f6dfbcabf1", 0x8a}], 0x1}, 0x0) 19:52:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000500)={'\x00', 0x200}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x13) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000240)={'ip6gretap0\x00', 0xe00}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='bridge0\x00') socketpair(0x9, 0x800, 0x4800, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000080)) r3 = gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000340)='&\x00') perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x8, 0x8, 0x0, 0xff, 0x0, 0xfffffffffffffffd, 0x10, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000400), 0x1}, 0x9, 0x28, 0xffffffff, 0x1, 0x1eab, 0x6, 0x7, 0x0, 0x200, 0x0, 0x100000000}, r3, 0x1, 0xffffffffffffffff, 0x8) socketpair(0x10, 0x4, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x8, 0x5, 0xd2, 0x0, 0xa79, 0x80000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x10000, 0xd9b}, 0x2000, 0x8, 0xfbfffff9, 0xe0e3c3676d19001d, 0xfffffffffffeffff, 0x4, 0x7f, 0x0, 0x7, 0x0, 0x3f}, 0x0, 0x9, 0xffffffffffffffff, 0x3) bpf$BPF_LINK_CREATE(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff, 0xe}, 0x10) 19:52:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x1c, 0x3, &(0x7f0000000900)=@framed, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1117.466744] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1117.525807] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1117.543764] IPVS: ftp: loaded support on port[0] = 21 19:52:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090025000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:10 executing program 3: socketpair(0xf, 0x3, 0x0, &(0x7f0000000140)) 19:52:10 executing program 4: socketpair(0x2, 0x1, 0x8, &(0x7f0000000000)) [ 1117.613543] bridge0: port 2(bridge_slave_1) entered disabled state [ 1117.620097] bridge0: port 1(bridge_slave_0) entered disabled state 19:52:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0185879, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r0, r1, 0x25}, 0x10) close(r2) [ 1117.956122] device bridge_slave_1 left promiscuous mode [ 1117.962601] bridge0: port 2(bridge_slave_1) entered disabled state [ 1117.973677] device bridge_slave_0 left promiscuous mode [ 1117.980997] bridge0: port 1(bridge_slave_0) entered disabled state [ 1117.993613] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1118.001563] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 19:52:10 executing program 5: socketpair(0xa, 0x2, 0x11, &(0x7f0000000000)) 19:52:10 executing program 3: socketpair(0xa, 0x2, 0x1, &(0x7f0000000000)) 19:52:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x1, &(0x7f0000000080)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbf22}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) 19:52:10 executing program 1: recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000000) sendmsg(0xffffffffffffffff, 0x0, 0x20000801) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbf22}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) 19:52:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090003000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='~', 0x1}], 0x1}, 0x0) close(r0) 19:52:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x23000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6609, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) [ 1118.103254] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:11 executing program 5: socketpair(0x10, 0x2, 0x600, &(0x7f0000000000)) 19:52:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/137, 0x89}], 0x300}, 0x0) sendmsg$inet(r1, &(0x7f0000001040)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001080)="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", 0x1000}, {&(0x7f0000000000)="a8", 0x1}], 0x2}, 0x0) 19:52:11 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000bc0)=@caif=@util={0x25, "81f17838b3bac65f97abc4cea5b79dbc"}, 0x80, 0x0, 0x0, &(0x7f0000000f00)=[{0x10, 0x111, 0x200}], 0x10}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbf22}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) [ 1118.160924] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 19:52:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090010000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:11 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002000)=ANY=[@ANYBLOB="18020000e2ffffff000000000000000085000000360000009500001800000000922ae83713ab9600010000801b10fb54a8cb72d232ad558c46fff4208d49631979a42d6884ec11ce1413ac30e00bd0081f8504e19a5183d769676520e98a263345e44d510100c4d86abeb12303ff139fe0d0020000d60400000007d3670000008aff66d6b3181ffc1d62a3954c11c27839dc007c4d296e7359ea79a75dd098bbc4fa13aee48ca9e8969faebf3183fe803ab3f5024b52dc265b36fc9dae00a09404f01f9504d0976d252bd8d24538556e5e57bee3b8cf464ef3c6a76e3abdb21696e340bb8e2a093adc57196b40def3858ef569147fa4108328392d322ab4df10a2f69a6bdf7257ab44e81042410f57466f59aea2544047d6d8ac442e0000000000ee16c729300d230180000000000000a87db3670bba302085a22b5a8b051dc254ed5290a8cd8470e776d6b80630d6cbde49b29a6cb5f4fc0001745cff0e5fe57238aeada5acf3209a08439f1ff01ffbe5b57922b6f6c67e02aa6d7760525b595fe1f697bc114ed1778e97a3f0295f946974cfb458be2a34cf924dc37b558fbf17a76f3547497aba5086e30ec8a57c814382ffab045ca077a9d15251875432e74b54afaf4985683c229ff92be0dade95ae7b68136b0046d535dd39c0f35469869e9b342b953f81447e6b9e522d62b1e6ffdaab304f134306335fc7a44195254b45a6c1312a13696c7202df5f764713504f94c5e0fbc70bcb975f97ed7b0300000000000000e54e9072a22d91744a332e2fa806e63c5cd98a32ebf5dfbcfb0000002cf6c75ac63f04af77c98a1459ab1664885173b2b7130eae67e0ebe380d0f648713e68153579c02d71c58d147b00821ab9a6475b31e1ebf1369afe98682efbf3983f283f2f00000000992774814d63c933912dd0c6908149cb79c5cb0a38856929e7d8b1b06c9bd5d7e5490f3b8596b694ea9483bd4bd287c83df998a7469426ec8b0000000000000010ff2cd18bdd8ad0983bc90770bbd26a82b9d99d17c02a97b523c47ef8c33400e90d34be011904ff782ca00edf1147a71bcc738ef636d32b01933556f9afe772cd45af8aefee2753088e02ca6bb2feecf0a93a03371320980865c7c62ea4d8f8a864dce9fa85aeb0454349100296ee2dba39c3f6fd6cf96714e11fe03b506380591a8c68e537dd659a7418c1e122bd4c219f8a30160f2ac54f842e3be1c95b15175d0e664beb126000e96549e1a1208c686edb475b705e8a9515c96f4fc6b3c925ea404edbb3845111aed1637ec3890f1de61026dc6c6618580fd6ce9eac602c1756f6d105671241d48a8abe64f5caecc45f953383722135ed9925989e01eae489ec7052f8ed72c326c7a8aa63999ee1f47ce5cb7365773ea52b6dbbd56d222659480e82c6f84d2033d9d1b597c54ce1822d14b7c7699b9d54f5f11f2e7fdc7557515eb70212e8701e94e7b421dd474cffbc35bc8623cd5eb68af82275a940be0400000000000000bcc3fbe7d90de96d6a8e9f54cf881f606b381e4803b500000000000000000000004a2357ba5f6000de1cfa88b7165dcfcf2aaee86d48f05b5ae4fc2bbc908fdb686d5da2da1a4b5024b653d7923c19e6cb723c1923b3eea2d73e136dff383c9fbbac53dfdcb1a68c98d8e96fe38207ac753faf3ebed3409144c7c53d6318ced678a621450a2608d51a1c08bea5e886ab519b01e9f2772e5fa454d68d90677d8de36c3215d2ff3cfadcf65eb92adc6c62d66b11cb2d7556414a86dfa94bb7aa52c7febb169b2efcbbc5bccf9d39bed802f4f056976a128c76629a362ee9cc624ec454b90200fd9603f96908bddc14500000000000000000000000000000947166e186051561a949d0e19dada1ea7087fe6758bbaa"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r0, r1, 0x25}, 0x10) close(r2) 19:52:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x1e, 0x3, 0x0, &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) 19:52:11 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x7) 19:52:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='~', 0xfdbe}], 0x1}, 0x0) 19:52:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x12, 0x3, 0x0, &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1118.310346] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1118.346194] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 19:52:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/137, 0x89}], 0x300}, 0x0) sendmsg$inet(r1, &(0x7f0000001040)={0x0, 0x0, 0x0}, 0x0) 19:52:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x19, 0x3, 0x0, &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090018000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:11 executing program 3: perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000002180)=ANY=[@ANYBLOB="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"/2841], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe50}, 0x48) 19:52:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x15, 0x2, 0x8, &(0x7f0000000200)) r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='memory.high\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) openat$cgroup_procs(r4, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x3, 0xb70, 0x7, 0x1010, 0xffffffffffffffff, 0x0, '\x00', 0x0, r3, 0x0, 0x5, 0x4, 0xa}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000080)='cpusAq\xc8\xcf\x9c\x1c\xc5M\xbf\xdb\xf1\xe9\xf41[\xfcy\xc4et\x00'}, 0x30) r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) close(r7) close(r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={r3, 0x24, 0x1, 0x7fff, 0x0}, 0x20) r8 = openat$cgroup_ro(r0, &(0x7f0000000240)='blkio.bfq.time\x00', 0x0, 0x0) write$cgroup_devices(r8, &(0x7f0000000100)=ANY=[@ANYRESHEX=r5], 0x8) write$cgroup_int(r2, 0x0, 0x0) 19:52:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xfffffffffffffffe, 0x15020) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:52:11 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) perf_event_open$cgroup(&(0x7f0000000400)={0x2, 0x80, 0x9, 0x8, 0x0, 0x4, 0x0, 0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x50c2, 0x100, 0x7, 0x9, 0x5, 0x5, 0x1}, r1, 0x9, 0xffffffffffffffff, 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000100)) write$cgroup_type(r3, &(0x7f0000000000), 0x4000) write$cgroup_type(r2, &(0x7f0000000000), 0x90a71300) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x9094}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0xb5155f0, 0x1, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x1, 0x2b11}, 0x11d00, 0x1f, 0x1000, 0x1, 0x3, 0xe55d, 0x0, 0x0, 0x5, 0x0, 0x18}) 19:52:11 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='pids.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) syz_clone(0x10809400, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 19:52:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x53, 0xc1, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x8, 0x2}, 0x8800, 0x101, 0x2, 0x0, 0xffffffff, 0xffffaffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) perf_event_open$cgroup(&(0x7f0000000400)={0x2, 0x80, 0x9, 0x8, 0x0, 0x4, 0x0, 0x2, 0x80, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x50c2, 0x100, 0x7, 0x9, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3}, r1, 0x9, 0xffffffffffffffff, 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000100)) write$cgroup_type(r3, &(0x7f0000000000), 0x4000) write$cgroup_type(r2, &(0x7f0000000000), 0x90a71300) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x9094}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0xb5155f0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x1, 0x2b11}, 0x11d00, 0x1f, 0x1000, 0x0, 0x3, 0xe55d, 0x0, 0x0, 0x5, 0x0, 0x18}) [ 1118.528070] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 19:52:11 executing program 4: keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000004500)={0x0}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x40801000, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) 19:52:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090025000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:11 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)) 19:52:11 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3, 0x3, &(0x7f00000003c0)=[{0x0, 0x0, 0xfffffffffffffffc}, {&(0x7f0000000180)="9cea6f6cb5ae0271ee893b45e0cf80fbafb76de110ef0e28317905dc9dd244eee26f1ccf51e08537a24fe22b0018bea6121dba4bf3f95029b6d41322c39dd5fc0a8579e2fc15cecf141c5c711c149caafdc5c3197fe7bc9d2e822a45ef4691925dba6e7366", 0x65, 0x4}, {0x0}], 0x182004, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'cp874'}}], [{@pcr}, {@smackfsroot={'smackfsroot', 0x3d, '@\xb2\\'}}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000000580)="9c0c43f2f092d5d35680efebc9f583194b38b8a5ff", 0x15, 0x1}], 0x0, 0x0) write$char_usb(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000800), 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x70, 0x0, 0x0, 0x0, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xc780}, {0x6}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffff000}, {0x6, 0x11, 0x2}}]}, 0x70}}, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000009c0)='./file0\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'wlan0\x00'}) sendmsg$NL80211_CMD_SET_NOACK_MAP(0xffffffffffffffff, 0x0, 0x40000) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 1118.688090] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 19:52:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090000200a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) [ 1118.755541] IPVS: ftp: loaded support on port[0] = 21 19:52:11 executing program 1: socket(0x33, 0x0, 0x0) 19:52:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01"], 0x14}}, 0x0) 19:52:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090000240a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1118.872677] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 19:52:11 executing program 2: keyctl$dh_compute(0x6, 0x0, 0x0, 0x0, 0x0) 19:52:11 executing program 3: socketpair(0x2, 0x3, 0x4, &(0x7f00000001c0)) 19:52:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000002a00), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002ac0)={&(0x7f0000000200)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000500e867740b06050337ec74d6ce866726000000000f0000000e0001006e6574646576"], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, 0x0, 0x0) 19:52:11 executing program 4: keyctl$dh_compute(0x17, &(0x7f0000004380), 0x0, 0x4, &(0x7f0000004500)={0x0, &(0x7f0000004480)="8afe18768610db5ca8f9b7c4e017de25590fdb5aef396ed5e41567859743553e47bb4c1768a16f7e0398cff8531b54ec1cf6b67ae2c3e1539495daeec524186e6a", 0x41}) 19:52:11 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) syz_clone(0x40801000, &(0x7f0000000040), 0x0, &(0x7f0000000140), &(0x7f0000000180), 0x0) 19:52:11 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f00000001c0), 0x4) r1 = dup2(r0, r0) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) [ 1119.007629] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 19:52:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e020a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:11 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000002300)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_rr_get_interval(r0, 0x0) syz_clone(0x40801000, &(0x7f0000000040)="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", 0xfa, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) [ 1119.064197] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. 19:52:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000002a00), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002ac0)={&(0x7f0000000200)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000500e867740b0605"], 0x44}}, 0x0) 19:52:12 executing program 4: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x48040, 0x0) 19:52:12 executing program 2: keyctl$dh_compute(0xf, 0x0, 0x0, 0x0, 0x0) 19:52:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e030a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1119.168030] IPVS: ftp: loaded support on port[0] = 21 19:52:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000580)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@authinfo={0x10}], 0x10}, 0x20084) 19:52:12 executing program 2: keyctl$dh_compute(0x12, 0x0, 0x0, 0x0, 0x0) 19:52:12 executing program 1: syz_clone(0x40801000, &(0x7f0000000040), 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) [ 1119.262990] IPVS: ftp: loaded support on port[0] = 21 19:52:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e040a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1119.388883] IPVS: ftp: loaded support on port[0] = 21 19:52:12 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) sendto$inet6(r2, &(0x7f0000000040)="d9", 0x1, 0x0, &(0x7f0000001040)={0x1c, 0x1c, 0x3}, 0x1c) r3 = fcntl$dupfd(r0, 0x0, r1) dup2(r3, r2) 19:52:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e050a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:12 executing program 5: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x6}, &(0x7f00000000c0)={0x77359400}) 19:52:12 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000000)={0x2, {0x0, 0x0, 0x0, 0x1800}}) 19:52:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000a40)=[{0x0}, {0x0, 0x0, 0xffff}, {&(0x7f00000007c0)}, {0x0}], 0x0, 0x0) 19:52:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e060a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:12 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @ipv4={'\x00', '\xff\xff', @loopback}}}) 19:52:12 executing program 1: keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000004500)={0x0}) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000002280)) read$FUSE(0xffffffffffffffff, &(0x7f0000002300)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_rr_get_interval(r0, &(0x7f0000000000)) r1 = syz_clone(0x40801000, &(0x7f0000000040)="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", 0xfa, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)='@') sched_rr_get_interval(r1, 0x0) 19:52:12 executing program 3: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040), 0xfffffdfb) [ 1119.975088] IPVS: ftp: loaded support on port[0] = 21 19:52:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e070a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:13 executing program 4: keyctl$dh_compute(0x4, 0x0, 0x0, 0x0, 0x0) 19:52:13 executing program 3: syz_clone(0x40801000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:52:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e080a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000002a00), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002ac0)={&(0x7f0000002a40)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000f0000000e0001006e657464657673696d0000000f0002006e657464657673696d3001"], 0x44}}, 0x0) 19:52:13 executing program 1: write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000002c0)={0x18, 0xfffffffffffffffe}, 0x18) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[], 0x38}}, 0x0) 19:52:13 executing program 4: add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="8d", 0x1, 0xfffffffffffffffb) 19:52:13 executing program 2: accept4$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x13f}}, 0x20) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 19:52:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0a0a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000100)="0f23250f01cf66b83d008ed064660f3a2066f500640f01c4660f6bea66b8ea008ee0b9800000c00f3235008000000f309adb9c52d181000f20d80f22d8", 0x3d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f00005fd000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000380)="450f01d166b855008ee00f01cbb98f0400000f32c4834d6d8bc7000000920f79e90fc73fc4e36d5f0b77430f01c3c744240000000000c744240200000000c7442406000000000f011c24", 0x4a}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}]}) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000300)={0x6, 0x0, [{}, {}, {}, {}, {}, {0x0, 0x0, 0xf0}]}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:52:13 executing program 1: r0 = add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="8d", 0x1, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="8d", 0x1, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="8d", 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f00000002c0)={r0, r1, r2}, 0x0, 0x0, 0x0) [ 1120.476605] IPVS: ftp: loaded support on port[0] = 21 19:52:13 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='@') sched_rr_get_interval(0x0, &(0x7f0000000200)) 19:52:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0c0a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:13 executing program 2: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x24501) 19:52:13 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040), 0x0, 0x2) mmap$snddsp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 19:52:13 executing program 1: keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_clone(0x40801000, &(0x7f0000000040), 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) 19:52:13 executing program 5: keyctl$dh_compute(0x10, &(0x7f0000004380), 0x0, 0x0, 0x0) 19:52:13 executing program 4: symlinkat(&(0x7f0000000000)='.\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x0) 19:52:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0e0a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:13 executing program 2: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x100}, 0x0, &(0x7f00000000c0)={0x77359400}) 19:52:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e100a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:13 executing program 3: timer_create(0x5, &(0x7f0000002080), 0x0) 19:52:13 executing program 5: openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 19:52:13 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) syz_clone(0x40801000, &(0x7f0000000040), 0x0, &(0x7f0000000140), &(0x7f0000000180), 0x0) sched_rr_get_interval(0x0, &(0x7f0000000200)) [ 1120.884460] IPVS: ftp: loaded support on port[0] = 21 19:52:13 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 19:52:13 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) syz_clone(0x40801000, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) [ 1120.922578] validate_nla: 14 callbacks suppressed [ 1120.922588] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:13 executing program 4: keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000004500)={0x0}) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) syz_clone(0x40801000, &(0x7f0000000040)="04f4ee7ab3548b880f3b81386a4d1e1bc435b8729ff4d9aa26f810655ebfbc5481270a1f771b1b77ac173d562d95814583455588f27b59cd57d92f591e0230309260d2e57b37be1928d80c869ef5678461ca665ed0f0264dcc385cb9a4f281e741cc16f54551c3a1292c62c486133f4bd770d2d1de4c9ab5c638aae0ea35d5fb4e22d1143b2ac389be8bc2ffae9ba6c450f2157cabf28b7a68b67fc016470866cdeaddd2c7453b888145d69e10826378f7ae09347c1c5a6319d29bca", 0xbc, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) [ 1121.043127] IPVS: ftp: loaded support on port[0] = 21 [ 1121.082007] IPVS: ftp: loaded support on port[0] = 21 [ 1121.131264] IPVS: ftp: loaded support on port[0] = 21 19:52:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x4, 0x3, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000640)={[], 0x0, 0x180}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:52:14 executing program 5: keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000004500)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000002280)) syz_clone(0x40801000, &(0x7f0000000040)="04f4ee7ab3548b880f3b81386a4d1e1bc435b8729ff4d9aa26f810655ebfbc5481270a1f771b1b77ac173d562d95814583455588f27b59cd57d92f591e0230309260d2e57b37be1928d80c869ef5678461ca665ed0f0264dcc385cb9a4f281e741cc16f54551c3a1292c62c486133f4bd770d2d1de4c9ab5c638aae0ea35d5fb4e22d1143b2ac389be8bc2ffae9ba6c450f2157cabf28b7a68b67fc016470866cdeaddd2c7453b888145d69e10826378f7ae09347c1c5a6319d29bca", 0xbc, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) 19:52:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e180a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1121.250822] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1121.287012] IPVS: ftp: loaded support on port[0] = 21 19:52:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e600a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1121.323200] *** Guest State *** [ 1121.333885] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 1121.364247] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 1121.389302] CR3 = 0x0000000000000000 [ 1121.399667] RSP = 0x0000000000000000 RIP = 0x0000000000000231 19:52:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt(r0, 0x0, 0x1600bd7d, &(0x7f0000000040)="83", 0x1) 19:52:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002f40)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfe80000000000000}}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000080)="b80e5eecbb401c861be48700354b142276d54be324066e2d44dff7d3419f2cec15f366475f76990a2cee91", 0x2b}, {&(0x7f00000000c0)="82313bec5eea82390af7", 0xa}, {&(0x7f0000000100)="c7f6353f28254a7edaa498b00b736dae4e518f6efaa187a7039b90455c922a88f35e8adbb331b293213235af877f697afdc1386205612011f52e0a1ab54ac1e791b727949201dbde5363fcb1724458253742f996053cfa79c957acc5a38ed747ea07adc129ac968522d93bb90d737db09d3488345a2795481aa0f085e1001839ebabf102a388d980cc0b50049d3ed9f846aea42534fee297592ad83251abcdb2b84f7c6ab384", 0xfffffeb5}, {&(0x7f00000001c0)="4b3aa27e581df42219bc8feba2669ec0c21f2982a5019a7f72f5d919196a48f5a5ddaaa50fa9c0758ee2784d4b396cb5575720346f487c89855d458cb1bf569b34ba881eacddf4bb99316b5b20431f14ecf008a059613dd5064baedaf2aaf3666966fc3adb4a57555ec394ed1381a084fc8eb08a64fc9b7c2c502e39e5a87ddcc1375525fb3641fe8c2ab8a1eea7276f93dda58f28f68a360be54fe77ad6cf0dd7f384e8fbf1a26f8175ee5de711e4be066317f6fd50b5a04ee345c31228659b582caaf1e0f1c3514a21cd82e566bc", 0xcf}, {&(0x7f0000000700)="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", 0x1000}], 0x13, &(0x7f0000000340)}}, {{&(0x7f0000000380)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000001880)=[{&(0x7f00000003c0)="c3c0b42fe5ef27b70530f81db8cbb5e8ebf0acaeb65464e4bd26640251b3ac17f4f4d3e756b058e200749352bb5536d962fe9d2d2cd035022c06157b2c7961147f43ae4282c7e08ac23d447bd80267dec42a8caf49266d40ffb37d03a6eda3725e36127238e0dc1d07a2a08bc5e9702b55805a657e1ad31d50c5977c3a5d660b022f6139042c7666e2019410028f3c403b6850e4f9c401022bdd7d9381dbae4ffd32b29d2fba7b5fa1827749b327bc4bd809aa2f8e8c181ec327af711cc61915d571e6c720994c37bd60300ee6e4cfaf5c", 0xd1}, {&(0x7f00000004c0)="7ff32c9a2cd2577297eb36425003c8b8772ae16c139656707b53f3e8e8f64cf80849820229b50824dae7192b8940bcf269cf7e042f4adaa447597a30fde29d3147e82b5203f147ff394579ea1173d360ebab4603146c330485a8e2162f7f07eee3841edec33988de4bfa6e", 0x6b}, {&(0x7f0000000540)="79d4653a05a042ba56556fdc55057ff3c98b493ff8b3b6c5a4a2e0bf675bccb1eb3006298bc88af153c4da016dcf3f046dbee059eabbdd16488260f0fc13c323bf6828512f16b808ee834884d1805b073f99606829abd578ebaaef4c08dee12ce365a7334d05357255d3d2b7e20fe94b0a13307014e925e2b0a3eda649858885de3958b7fb5c52d4f5c99d5f6c8f7e4906f68dd728e7e6519b4e4f2491b249881277c6144c58029369a36683d76fc5d63cb6fa3aedb25bef26ec2d84dba0453481280674bc2331e5bda9d51f8512ddf8b68347", 0xd3}, {&(0x7f0000001700)="2e209e425ac853076b7415f03fe8d3ffff14751d361d7dc3c6b612660cd8f843c9b8f7b16244fb54716bbfd4072d80ea0985b185ea02a848c6ea6e3b0ae51b7f991a1fb32a5aae18c53423af7a71f7fde4aee25d6d96a8524c785fa1846a0d48eeeff4a477861962c313ecc36f383ceb30706803d797c95f126151eb385e545c1dce831afda99950c3094ac26041f2ece919f3c3ad572bcd096edb2d8b14734db9b375", 0xa3}, {&(0x7f0000000640)="2a4045fcbd42f40d8d1c8bc66e758c5ed19e05e2eb5c532cd44c22e9503026036a6fbfe0820b23033d0be97a629dde8c64cd1b996d0b3bc81678368027eb7f14d3d4a177746c70759a8e34d339da14eacfb4a9ef6410b41f937f4ae156da70ee345a83c3c0d71d943365035e2f84262a78b0c082e094", 0x76}, {&(0x7f00000017c0)="ffd157860c096d60cec68e6f8a91ee450cda20297305562ce44abe64c71e892faa9f12a98c6d032e328883dcd80a88ea4ac974bf670da58babfb63666a97a6c3faef2bae1ca3e780bac620d94a4dcb6d21b521f47a4d5a9c48e2cb01cf478d160024b84fb3fd45f3aa328b36b6263efe97167424f3f752ae19448d95930259f4a8b1", 0x82}], 0x6, &(0x7f0000001900)=[@hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x0, '\x00', [@pad1]}}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x0, 0xc, 0x0, 0x0, 0x0, [@dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, @loopback]}}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0x0, 0x3, '\x00', [@ra, @jumbo, @hao={0xc9, 0x10, @empty}]}}}, @hopopts={{0x58, 0x29, 0x36, {0x0, 0x7, '\x00', [@jumbo, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}, @ra, @hao={0xc9, 0x10, @mcast2}, @pad1, @enc_lim, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim]}}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x0, 0xc, 0x0, 0x0, 0x0, [@private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, @private0, @mcast1, @dev]}}}], 0x1a0}}, {{&(0x7f0000001ac0)={0xa, 0x0, 0x0, @private0}, 0x1c, &(0x7f0000002e00)=[{&(0x7f0000001b00)="a008fdc7772085d63e39b6a58dba94a0c7409b41bd98b236274e4ea56a744d673c1004f957d95794eb296a2c67ff70de97244c6460cbed33b1efd61792097d31752bd6d9caf9dc9bd6206630e884f613b0847203df605cd82b6a424d4846cfc0c1da246739992d7697d2a915b574b4d52c8b29b2d787005f871570cca269b9ddef7fb26aa1e987df5b028452fb743a26e57de99cfd9dcfa471d0f7a34c3d932696", 0xa1}, {&(0x7f0000001bc0)="516594193c8b0b0c85f75ba6dd356fbfa9fa05ba277a0163b57e9d196eb6df5f0dd57434db2141c695a1617ddb9b89cf5af842e5372c6de04e9acfea1624b807172f779bebdd43a8106d7900a53810d56a771a957152519aef71d6e06318d46952e9570420d8acec2cf8cc1868bf922c7117322f63ab3ce4d7163d7078d1c9868c870c719d34f4d95166d7b3d1d3b6c8f3460405b08e11ebe62d1f4929e5f0ba8515ece1adfe49735f74d47f00bdb8edd9efb12b4fd36659da1a0f2dc9d7c2709bf6d480cb23bcf1668dd36454c333190fea27ea4a1be65c0d346a54b783a206b0169377af8545b536e71c75", 0xec}, {&(0x7f0000001cc0)="7bd6d4bcd0aec18bf6e7bd39863a93002c2a51ae3c3c25c87b69c23c0d0a0a2a0100d539b96b267376537ff65abb1cbe3c0c938659b4c9db2521d52a28bf4b3c3d207fbaeb5b5b7eb01ecf298b3aa34c05b4ae39ecd97109eb93f2258938", 0x5e}, {&(0x7f0000001d40)="20cfce251994952069493f72a84e6ad45afeb2158202332ebf94731c4a2897750b4eea645b17b8a35e45c4b382a49a408d0075ee", 0x34}, {&(0x7f0000001d80)="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", 0x1000}, {&(0x7f0000002d80)="609f47a08bdb67dceccf4c1255091cdb93ca85a5d5f1d31708759b773ab974d5603b7877837024bdc60dabedb90a0d9f13ba2830fc50ecb6099d5e9790667d089540aff0f1d85c3a8d8a90a568f4752eb6f70789dd0d51c43c43089f52e391489cea7eae09ad5d5a", 0x68}], 0x6, &(0x7f0000002e80)=[@dontfrag={{0x14}}, @dstopts={{0x78, 0x29, 0x37, {0x0, 0xb, '\x00', [@hao={0xc9, 0x10, @remote}, @generic, @pad1, @enc_lim, @enc_lim, @calipso={0x7, 0x40, {0x0, 0xe, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}}}, @flowinfo={{0x14}}], 0xa8}}], 0x4, 0x0) [ 1121.412075] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1121.422007] RFLAGS=0x00000346 DR7 = 0x0000000000000400 19:52:14 executing program 4: get_robust_list(0x0, &(0x7f00000002c0)=0x0, &(0x7f0000000300)) 19:52:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0018000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1121.475559] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 1121.501675] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 19:52:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0100001a00010008000000000000000a0000000007ff000001000008001700080000000800100002000000080004"], 0x13c}}, 0x0) [ 1121.534815] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 19:52:14 executing program 3: keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000004500)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_clone(0x40801000, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) 19:52:14 executing program 4: io_setup(0x7fffffff, &(0x7f0000000000)) [ 1121.601790] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1121.630878] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:14 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="1c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0xee01], 0xd8}, 0x0) [ 1121.659779] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1121.690165] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1121.735640] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1121.762936] IPVS: ftp: loaded support on port[0] = 21 [ 1121.786874] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 1121.799835] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 1121.821172] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 1121.838610] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 1121.847625] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 1121.872388] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 1121.886126] Interruptibility = 00000001 ActivityState = 00000000 [ 1121.908210] *** Host State *** [ 1121.911427] RIP = 0xffffffff811a9c2f RSP = 0xffff888094e078c0 [ 1121.917405] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 1121.926484] FSBase=00007f5165b62700 GSBase=ffff8880ba100000 TRBase=fffffe0000003000 [ 1121.935107] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 1121.941604] CR0=0000000080050033 CR3=0000000097e82000 CR4=00000000003426e0 [ 1121.950304] Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff88201290 [ 1121.957338] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 1121.963950] *** Control State *** [ 1121.968344] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 1121.975026] EntryControls=0000d1ff ExitControls=002fefff [ 1121.981417] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 1121.988824] VMEntry: intr_info=80000301 errcode=00000000 ilen=00000000 [ 1121.995496] VMExit: intr_info=80000301 errcode=00000000 ilen=00000001 [ 1122.002497] reason=80000021 qualification=0000000000000000 [ 1122.009176] IDTVectoring: info=00000000 errcode=00000000 [ 1122.014634] TSC Offset = 0xfffffdbfb624128c [ 1122.019347] EPT pointer = 0x000000009807401e [ 1122.023760] Virtual processor ID = 0x0001 [ 1122.028666] *** Guest State *** [ 1122.031961] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 1122.041213] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 1122.051547] CR3 = 0x0000000000000000 [ 1122.055266] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 1122.083965] RFLAGS=0x00000346 DR7 = 0x0000000000000400 [ 1122.100692] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 1122.107388] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 1122.133933] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1122.180756] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1122.189563] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1122.208621] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1122.230497] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1122.249429] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 1122.281402] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 1122.302002] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 1122.320775] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 1122.348706] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 1122.379126] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 1122.386696] Interruptibility = 00000001 ActivityState = 00000000 [ 1122.421988] *** Host State *** [ 1122.435546] RIP = 0xffffffff811a9c2f RSP = 0xffff88804d26f8c0 [ 1122.489869] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 1122.515153] FSBase=00007f5165b41700 GSBase=ffff8880ba000000 TRBase=fffffe0000034000 [ 1122.541972] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 1122.550689] CR0=0000000080050033 CR3=0000000097e82000 CR4=00000000003426f0 [ 1122.603078] Sysenter RSP=fffffe0000034000 CS:RIP=0010:ffffffff88201290 [ 1122.620657] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 1122.647789] *** Control State *** [ 1122.651277] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 1122.697043] EntryControls=0000d1ff ExitControls=002fefff [ 1122.703957] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 1122.728934] VMEntry: intr_info=80000301 errcode=00000000 ilen=00000000 [ 1122.735612] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 1122.758038] reason=80000021 qualification=0000000000000000 [ 1122.796911] IDTVectoring: info=00000000 errcode=00000000 [ 1122.802709] TSC Offset = 0xfffffdbfb624128c [ 1122.807038] EPT pointer = 0x000000009807401e [ 1122.857464] Virtual processor ID = 0x0001 19:52:15 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b1, &(0x7f0000000280)={'ip6_vti0\x00', 0x0}) 19:52:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x19}, 0x48) 19:52:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0020000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:15 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)=""/51) 19:52:15 executing program 5: r0 = socket$inet(0x2, 0x3, 0x79) sendmmsg$inet(r0, &(0x7f0000003c00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001300)=[@ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0xf, 0x2, [{0x0, 0x5, "077810"}, {0x0, 0x2}, {0x0, 0x2}]}]}}}], 0x20}}], 0x1, 0x0) 19:52:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8914, &(0x7f0000000000)={'wg1\x00'}) [ 1123.055677] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:15 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5460, 0x0) 19:52:15 executing program 2: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x20400, 0x0) 19:52:16 executing program 5: r0 = socket$inet(0x2, 0x3, 0x79) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891a, &(0x7f0000000080)={'gre0\x00', 0x0}) 19:52:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:16 executing program 1: clock_gettime(0x0, &(0x7f0000000100)={0x0}) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x7, 0x0, 0x0, 0x0, 0xfff, 0x3, 0x200}, &(0x7f0000000080), &(0x7f0000000200)={r0}) [ 1123.151477] netlink: 'syz-executor.0': attribute type 32 has an invalid length. 19:52:16 executing program 2: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) 19:52:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0025000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x2, &(0x7f00000003c0)) 19:52:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x29, 0x0, 0xfd, 0x0, 0x20, @private0, @private0}}) 19:52:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) 19:52:16 executing program 3: r0 = socket$inet(0x2, 0x3, 0x79) sendmmsg$inet(r0, &(0x7f0000003c00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001300)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@cipso={0x86, 0x1c, 0x2, [{0x0, 0x5, "077810"}, {0x0, 0x2}, {0x0, 0x2}, {0x0, 0xd, "37ea606a3cc9a401bb35c9"}]}]}}}], 0x30}}], 0x1, 0x0) 19:52:16 executing program 4: openat$sndtimer(0xffffffffffffff9c, 0x0, 0x402000) [ 1123.437122] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000080)=""/177, 0x2e, 0xb1, 0x1}, 0x20) 19:52:16 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[], 0xd8}, 0x0) 19:52:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8995, &(0x7f0000000000)={'wg1\x00'}) [ 1123.518558] netlink: 'syz-executor.0': attribute type 37 has an invalid length. 19:52:16 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x10000000, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@fat=@debug}]}) 19:52:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0033000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0x207}]}) 19:52:16 executing program 1: r0 = socket$inet(0x2, 0x3, 0x79) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8934, &(0x7f0000000080)={'gre0\x00', 0x0}) [ 1123.740203] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:16 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x109842) pwritev(r0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000200)="01", 0x1}], 0x2, 0x0, 0x0) [ 1123.847652] netlink: 'syz-executor.0': attribute type 51 has an invalid length. 19:52:16 executing program 4: r0 = socket$inet(0x2, 0x3, 0x79) sendmmsg$inet(r0, &(0x7f0000001500)=[{{&(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000001580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast1}}}, @ip_tos_int={{0x14}}], 0x30}}], 0x1, 0x0) 19:52:16 executing program 1: sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) 19:52:16 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x9, 0x0, r0, 0xfffffffffffffffc, 0x0) 19:52:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e03d7000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:16 executing program 2: getgroups(0x1, &(0x7f0000000000)=[0x0]) io_setup(0x3, &(0x7f00000000c0)) io_getevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 19:52:16 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) 19:52:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8991, &(0x7f0000000280)={'ip6_vti0\x00', 0x0}) 19:52:17 executing program 5: sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0}) select(0x40, &(0x7f0000000000)={0x0, 0x8, 0x0, 0xffffffffffff7fff}, &(0x7f0000000040)={0x7, 0x81, 0x0, 0x0, 0x0, 0x0, 0x200, 0x6}, 0x0, &(0x7f0000000200)={r0}) 19:52:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000600)={0x188, 0x0, 0x0, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0xffd7}, {0x52}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x8}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}, {0x8}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}, {0x8}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}, {0x8}}]}, 0xfffffffffffffd23}}, 0x0) 19:52:17 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x4) 19:52:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0004000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:17 executing program 1: socketpair(0x1, 0x0, 0x9, &(0x7f0000000040)) 19:52:17 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000180)) 19:52:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)=""/51) 19:52:17 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x855, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, 0x48) 19:52:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8935, &(0x7f0000000000)={'wg1\x00'}) 19:52:17 executing program 5: r0 = epoll_create(0xe9dd) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 19:52:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0010000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:17 executing program 4: getrusage(0xffffffffffffffff, &(0x7f0000000500)) 19:52:17 executing program 2: io_setup(0x3, &(0x7f00000000c0)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) 19:52:17 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) 19:52:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0018000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000200)=@updpolicy={0xb8, 0x15, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@multicast2=0xfc020000, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 19:52:18 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 19:52:18 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000007880)={0x0, 0x989680}) 19:52:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0025000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:18 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, 0x0) 19:52:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000980)={0x2, &(0x7f0000000940)=[{0x20, 0x0, 0x0, 0x9}, {0x6}]}) 19:52:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8990, &(0x7f0000000000)={'wg1\x00'}) 19:52:18 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) select(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x8}, 0x0, 0x0) 19:52:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0033000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:18 executing program 4: r0 = epoll_create(0x6) r1 = eventfd(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) 19:52:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8993, &(0x7f0000000280)={'ip6_vti0\x00', 0x0}) 19:52:20 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32], 0xd8}, 0x0) 19:52:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000280)={'ip6_vti0\x00', 0x0}) 19:52:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e00d7030d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:20 executing program 4: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8000}, 0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={[0x9]}, 0x8}) 19:52:20 executing program 5: setresuid(0xee01, 0xee01, 0x0) 19:52:21 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x2000400) 19:52:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8947, &(0x7f0000000000)={'wg1\x00'}) 19:52:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[], 0x30}}, 0x0) 19:52:21 executing program 4: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1128.315391] validate_nla: 8 callbacks suppressed [ 1128.315400] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e0000200d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891f, &(0x7f0000000280)={'ip6_vti0\x00', 0x0}) 19:52:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f00000000c0)) [ 1128.466827] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a6400000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:21 executing program 4: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x342778b4e0277d76) 19:52:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8991, &(0x7f0000000000)={'wg1\x00'}) 19:52:21 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) write$evdev(r0, 0x0, 0x0) 19:52:21 executing program 3: r0 = socket$inet(0x2, 0x3, 0x79) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8904, &(0x7f0000000080)={'gre0\x00', 0x0}) 19:52:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8992, &(0x7f0000000000)={'wg1\x00'}) 19:52:21 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x40044591, 0x0) 19:52:21 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 19:52:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) [ 1128.970860] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r0, 0x0, 0xcc, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000200)=@updpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@multicast2}}}, 0xb8}}, 0x0) 19:52:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a020d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x5c, 0x441c1, 0x0, 0x0) 19:52:22 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 19:52:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r0, 0x0, 0xcc00, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000200)=@updpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@multicast2}}}, 0xb8}}, 0x0) 19:52:22 executing program 3: connect$nfc_raw(0xffffffffffffffff, 0x0, 0x0) 19:52:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89a2, &(0x7f0000000000)={'wg1\x00'}) 19:52:22 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@fat=@debug}]}) 19:52:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8929, &(0x7f0000000280)={'ip6_vti0\x00', 0x0}) 19:52:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x11, &(0x7f00000012c0)='3', 0x1) [ 1129.358006] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:22 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)=""/51) 19:52:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a030d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:22 executing program 1: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x7}, 0x0) 19:52:22 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0xc8140, 0x0) read$FUSE(r0, 0x0, 0x0) 19:52:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8955, 0x0) 19:52:22 executing program 3: io_setup(0x3, &(0x7f00000000c0)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, 0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)) [ 1129.712526] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}}, 0x0) 19:52:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a040d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80104592, 0x0) 19:52:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 19:52:22 executing program 4: syz_open_dev$vcsa(&(0x7f0000000140), 0x0, 0x20200) 19:52:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000200)=ANY=[@ANYBLOB="b800000015000112"], 0xb8}}, 0x0) [ 1130.063405] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a050d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x5) [ 1130.304146] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:23 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x60041, 0x0) 19:52:23 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x14}, 0x14}}, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) 19:52:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x79) r1 = dup(r0) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) 19:52:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000480)={0x0, 0x0, 0x6, 0x0, 0x172, &(0x7f0000000080)="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"}) 19:52:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a060d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) [ 1130.734946] raw_sendmsg: syz-executor.5 forgot to set AF_INET. Fix it! 19:52:23 executing program 1: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x56000239) 19:52:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000200)=ANY=[@ANYBLOB="b800000015000100000000000000000000000000000000ffff00000000000001e000000200eb0000000000000000000000000000000000000a"], 0xb8}}, 0x0) [ 1130.779751] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:23 executing program 2: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000200)={0x0, r0/1000+60000}) 19:52:23 executing program 3: mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2) 19:52:23 executing program 4: socketpair(0x10, 0x0, 0x8, &(0x7f0000000080)) 19:52:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a070d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @private0}}) 19:52:23 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) [ 1131.149633] nla_parse: 16 callbacks suppressed [ 1131.149704] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 19:52:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r0, 0x0, 0x0, 0x120, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000200)=@updpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@multicast2}}}, 0xb8}}, 0x0) [ 1131.196474] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89a1, &(0x7f0000000000)={'wg1\x00'}) 19:52:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a080d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x80087601, 0x0) 19:52:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40) 19:52:24 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2042, 0x0) syz_mount_image$erofs(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1131.504516] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x48) 19:52:24 executing program 5: io_setup(0x10, &(0x7f0000000040)=0x0) io_destroy(r0) 19:52:24 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/cgroups\x00', 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 19:52:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0a0d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg2\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={r2, @empty, @empty}, 0xc) 19:52:24 executing program 1: getresgid(&(0x7f0000000040), 0x0, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) 19:52:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0c0d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:24 executing program 2: r0 = epoll_create(0xe9dd) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x4, 0x0, 0x0) 19:52:25 executing program 1: lgetxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:52:25 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10b444, &(0x7f00000004c0)) 19:52:25 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), &(0x7f0000000440)="f6f32381e4c657bdc02540fb4c17038c7aeb916f66574805c901bf7f65297e5fe4f3c7ddfd0652313d", 0x29, 0x0) 19:52:25 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8000}, 0x0, 0x0, 0x0) 19:52:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0e0d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:25 executing program 5: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080), &(0x7f0000000200)={0x0, r0/1000+60000}) 19:52:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000000)=@updpolicy={0x13c, 0x13, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x84, 0x5, [{{@in6=@private0, 0x0, 0x3c}, 0xa, @in=@remote, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@multicast2, 0x0, 0x1}]}]}, 0x13c}}, 0x0) 19:52:25 executing program 1: socket$inet(0x2, 0xa, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) select(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x8}, 0x0, 0x0) 19:52:25 executing program 3: r0 = socket$inet(0x2, 0x3, 0x79) sendmmsg$inet(r0, &(0x7f0000003c00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001300)=[@ip_retopts={{0x24, 0x0, 0x7, {[@cipso={0x86, 0x12, 0x2, [{0x0, 0x5, "077810"}, {0x0, 0x2}, {0x0, 0x2}, {0x0, 0x3, '7'}]}]}}}], 0x28}}], 0x1, 0x0) 19:52:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)) 19:52:25 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) recvfrom(r0, 0x0, 0x0, 0x101, 0x0, 0x0) 19:52:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a100d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:25 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000940), 0x0, 0x0) 19:52:25 executing program 4: socket$inet(0x10, 0x2, 0x1) 19:52:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a180d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:25 executing program 1: r0 = socket(0xa, 0x1, 0x0) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/112, 0x70}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 19:52:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000000c0)=@newae={0x40, 0x12, 0x635, 0x0, 0x0, {{@in=@broadcast}, @in6=@local}}, 0x40}}, 0x0) 19:52:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000280)={0x0, 0x9, &(0x7f00000001c0)="5fd4066d9332e81152"}) 19:52:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5452, 0x0) 19:52:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a600d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:25 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='memory.stat\x00', 0x0, 0x0) 19:52:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000011c0)={&(0x7f0000001280)=@abs, 0xffffffffffffff3e, &(0x7f0000001240)=[{&(0x7f0000000180)="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", 0x1000}], 0x1}, 0x44010) 19:52:26 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x109842) pwritev(r0, &(0x7f00000005c0)=[{&(0x7f00000001c0)='9', 0x1}, {0x0}, {&(0x7f0000000240)="11", 0x1}], 0x3, 0x0, 0x0) 19:52:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee00}}}], 0x20}, 0x0) 19:52:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000000c0)=@newae={0x40, 0x15, 0x635, 0x0, 0x0, {{@in=@broadcast}, @in6=@local}}, 0x40}}, 0x0) 19:52:26 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000002c80)=""/4096) 19:52:26 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[], [{@permit_directio}]}) [ 1133.369843] validate_nla: 4 callbacks suppressed [ 1133.369855] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:26 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/diskstats\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 19:52:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x40044591, &(0x7f0000000040)=""/51) 19:52:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000f000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:26 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x41) sendmmsg$inet6(r0, &(0x7f00000032c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb405}, 0x1c, 0x0}}], 0x1, 0x0) 19:52:26 executing program 3: r0 = socket$inet(0x2, 0x3, 0x79) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001540)={'batadv_slave_1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f00000034c0)=[{{&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000001580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @multicast1, @empty}}}], 0x20}}], 0x1, 0x0) [ 1133.608964] tmpfs: No value for mount option 'permit_directio' [ 1133.685074] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:26 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 19:52:26 executing program 1: socketpair(0x11, 0x3, 0x0, &(0x7f0000000240)) 19:52:26 executing program 2: r0 = socket$inet(0x2, 0x3, 0x79) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000001540)={'wg2\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000001500)=[{{&(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000001580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @broadcast=0x10, @multicast1}}}], 0x20}}], 0x1, 0x0) [ 1133.769143] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0018000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:26 executing program 4: process_vm_writev(0x0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/147, 0x93}], 0x1, &(0x7f0000000400)=[{0x0}], 0x1, 0x0) 19:52:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f00000000c0)=@framed={{}, [@cb_func, @kfunc, @map_val, @kfunc, @map_idx_val]}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:26 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002bc0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50, 0x0, r1}, 0x50) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) 19:52:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)={[{@errors_continue}]}) 19:52:26 executing program 5: syz_clone(0x20000, 0x0, 0x7003000000000000, 0x0, 0x0, 0x0) 19:52:26 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r0, &(0x7f0000000280)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/188, 0xbc}], 0x3, &(0x7f0000000400)=[{&(0x7f0000000300)=""/47, 0x2f}, {&(0x7f0000000340)=""/180, 0xb4}], 0x2, 0x0) 19:52:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(r0, &(0x7f0000000880)={&(0x7f0000000440)=@l2tp={0xa, 0x0, @rand_addr, 0x2}, 0x80, 0x0}, 0x0) [ 1134.184883] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:27 executing program 5: syz_mount_image$jfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x1000000, &(0x7f0000000300)={[{@errors_continue}, {@gid}]}) 19:52:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x25, &(0x7f0000000000)={0x7}, 0x14) 19:52:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, 0x0, &(0x7f00000000c0)) [ 1134.271013] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1134.307548] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1134.330839] bond0: Releasing backup interface team0 19:52:27 executing program 2: syz_clone(0x28003, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1134.417137] device team0 left promiscuous mode [ 1134.471809] device team_slave_0 left promiscuous mode 19:52:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0020000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000005c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 19:52:27 executing program 4: syz_clone(0x403e0400, 0x0, 0x0, 0x0, 0x0, 0x0) 19:52:27 executing program 2: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000024c0)={0x148, 0x0, 0x0, [{{0x5, 0x3, 0x10001, 0x3, 0x3, 0x0, {0x1, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x0, 0x9, 0xd6c, 0x6000, 0x6, 0x0, 0xffffffffffffffff, 0xe10, 0x6}}, {0x3, 0xd4b, 0x0, 0x1}}, {{0x1, 0x3, 0x0, 0x80000000, 0xffffffc3, 0x0, {0x0, 0x7, 0x5, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x5, 0xffffffffffffffff, 0xffffffffffffffff, 0x7ff, 0x5}}, {0x6, 0x9, 0x1, 0x0, '\\'}}]}, 0x148) syz_clone(0x44801080, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0) process_vm_writev(0x0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/147, 0x93}], 0x1, &(0x7f0000000400)=[{&(0x7f00000002c0)}, {&(0x7f0000000300)=""/47, 0x2f}, {0x0}], 0x3, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000440)={0x18, 0x0, 0x0, {0x4}}, 0x18) 19:52:27 executing program 5: socket(0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x1000000, &(0x7f0000000300)={[{@errors_continue}, {@gid}]}) 19:52:27 executing program 3: syz_clone(0x22025000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1134.588589] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:27 executing program 1: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x44801080, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) [ 1134.714349] 8021q: adding VLAN 0 to HW filter on device team0 [ 1134.793685] device team0 entered promiscuous mode [ 1134.805928] IPVS: ftp: loaded support on port[0] = 21 [ 1134.817224] device team_slave_0 entered promiscuous mode [ 1134.877299] IPVS: ftp: loaded support on port[0] = 21 [ 1134.890063] bond0: Enslaving team0 as an active interface with an up link [ 1134.925948] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1134.978212] IPVS: ftp: loaded support on port[0] = 21 [ 1134.984392] bond0: Releasing backup interface team0 [ 1134.991250] device team0 left promiscuous mode [ 1135.011716] device team_slave_0 left promiscuous mode 19:52:27 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010027bd700009dbdf250100000008000200bc2700000800030001000000050006008000000014"], 0x5c}}, 0x0) 19:52:28 executing program 3: io_setup(0x1, &(0x7f0000000040)=0x0) r1 = inotify_init() io_submit(r0, 0x3, &(0x7f00000005c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x2ab, r1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0]) 19:52:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0025000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1135.352078] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1135.399470] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1135.428760] 8021q: adding VLAN 0 to HW filter on device team0 19:52:28 executing program 5: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000024c0)={0x148, 0x0, 0x0, [{{0x5, 0x3, 0x10001, 0x3, 0x3, 0x3, {0x1, 0x6d, 0xbf7a, 0x0, 0x7, 0x1f, 0x0, 0x9, 0xd6c, 0x6000, 0x6, r0, 0xffffffffffffffff, 0xe10, 0x6}}, {0x3, 0xd4b, 0x0, 0x1}}, {{0x1, 0x3, 0x5, 0x80000000, 0xffffffc3, 0x7fff, {0x0, 0x7, 0x5, 0x0, 0x8000000000000000, 0x4, 0x77, 0x5, 0x3, 0x2000, 0x5, 0xffffffffffffffff, 0xffffffffffffffff, 0x7ff, 0x5}}, {0x6, 0x9, 0x1, 0x56de8187, '\\'}}]}, 0x148) r1 = syz_clone(0x44801080, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0) process_vm_writev(r1, &(0x7f0000000280)=[{&(0x7f0000000000)=""/147, 0x93}, {&(0x7f0000000100)=""/176, 0xb0}, {&(0x7f00000001c0)=""/188, 0xbc}], 0x3, &(0x7f0000000400)=[{&(0x7f00000002c0)}, {&(0x7f0000000300)=""/47, 0x2f}, {&(0x7f0000000340)=""/180, 0xb4}], 0x3, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$FUSE_GETXATTR(r2, &(0x7f0000000440)={0x18, 0x0, 0x0, {0x4}}, 0x18) [ 1135.487172] device team0 entered promiscuous mode [ 1135.494743] device team_slave_0 entered promiscuous mode [ 1135.532364] bond0: Enslaving team0 as an active interface with an up link 19:52:28 executing program 3: write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20}, 0x20) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) syz_clone(0x22025000, 0x0, 0x0, 0x0, 0x0, 0x0) 19:52:28 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000024c0)={0xb0, 0x0, 0x0, [{{0x0, 0x0, 0x0, 0x80000000, 0xffffffc3, 0x0, {0x0, 0x7, 0x5, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}}, {0x0, 0x0, 0x1, 0x0, '\\'}}]}, 0xb0) syz_clone(0x44801080, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0) process_vm_writev(0x0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/147, 0x93}], 0x1, &(0x7f0000000400)=[{&(0x7f00000002c0)}, {0x0}, {0x0}], 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) [ 1135.621369] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1135.649791] bond0: Releasing backup interface team0 [ 1135.713419] device team0 left promiscuous mode [ 1135.718128] device team_slave_0 left promiscuous mode 19:52:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000f000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1135.834203] IPVS: ftp: loaded support on port[0] = 21 [ 1135.917109] IPVS: ftp: loaded support on port[0] = 21 19:52:28 executing program 3: r0 = syz_clone(0x9b222600, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xe0001000, &(0x7f0000000000), 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) sched_rr_get_interval(0x0, &(0x7f0000000140)) sched_rr_get_interval(r0, &(0x7f0000000040)) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x182000}, 0xc, &(0x7f0000001300)={0x0}}, 0x4004800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x2f, 0x6, 0x0, 0x0, 0x0, @remote, @empty, 0x8, 0x1, 0x0, 0x1000}}) socketpair(0x9, 0x0, 0xffffffff, &(0x7f00000003c0)) [ 1136.112730] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1136.127578] 8021q: adding VLAN 0 to HW filter on device team0 [ 1136.159590] device team0 entered promiscuous mode [ 1136.170077] device team_slave_0 entered promiscuous mode [ 1136.248923] bond0: Enslaving team0 as an active interface with an up link [ 1136.287517] IPVS: ftp: loaded support on port[0] = 21 19:52:41 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x9}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000006c0)={&(0x7f00000003c0), 0x10, &(0x7f0000000640)=[{&(0x7f0000000400)="02", 0x1}], 0x1}, 0x0) 19:52:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0010000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:41 executing program 5: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000024c0)={0x148, 0x0, 0x0, [{{0x5, 0x3, 0x10001, 0x3, 0x3, 0x3, {0x1, 0x6d, 0xbf7a, 0x0, 0x7, 0x1f, 0x0, 0x9, 0xd6c, 0x6000, 0x6, r0, 0xffffffffffffffff, 0xe10, 0x6}}, {0x3, 0xd4b, 0x0, 0x1}}, {{0x1, 0x3, 0x5, 0x80000000, 0xffffffc3, 0x0, {0x0, 0x7, 0x5, 0x0, 0x8000000000000000, 0x4, 0x77, 0x5, 0x3, 0x2000, 0x5, 0xffffffffffffffff, 0xffffffffffffffff, 0x7ff, 0x5}}, {0x6, 0x9, 0x1, 0x56de8187, '\\'}}]}, 0x148) syz_clone(0x44801080, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000440)={0x18, 0x0, 0x0, {0x4}}, 0x18) 19:52:41 executing program 1: syz_mount_image$iso9660(&(0x7f0000000040), 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)) 19:52:41 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 19:52:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x100000a, 0x10, r0, 0x0) 19:52:41 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=@raw={'raw\x00', 0x9, 0x3, 0x308, 0x138, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x260, 0xffffffff, 0xffffffff, 0x260, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}, {{@ipv6={@local, @private2, [], [], 'vlan0\x00', 'tunl0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@srh={{0x30}}, @inet=@rpfilter={{0x28}}]}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 1148.458815] validate_nla: 1 callbacks suppressed [ 1148.458825] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:41 executing program 1: bpf$OBJ_GET_PROG(0x19, 0x0, 0x0) 19:52:41 executing program 4: mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000fec000/0xe000)=nil, 0xe000) 19:52:41 executing program 3: syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) [ 1148.520843] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1148.545168] bond0: Releasing backup interface team0 19:52:41 executing program 2: socket(0x2, 0xa, 0x5) [ 1148.623378] device team0 left promiscuous mode [ 1148.651458] device team_slave_0 left promiscuous mode [ 1148.654598] IPVS: ftp: loaded support on port[0] = 21 19:52:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000), 0x4) 19:52:41 executing program 4: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000a00)={&(0x7f0000000900), 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000a40)) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) [ 1148.712224] team0: Cannot enslave team device to itself 19:52:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0018000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)={0x18, r1, 0xfd, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x4}]}, 0x18}}, 0x0) 19:52:41 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x9}, 0x0, 0x0, 0x0) 19:52:41 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$NL80211_CMD_DEL_PMK(r0, 0x0, 0x0) 19:52:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 19:52:41 executing program 1: pselect6(0x40, &(0x7f0000000f40), 0x0, &(0x7f0000000fc0)={0xfda}, &(0x7f0000001040), &(0x7f00000010c0)={&(0x7f0000001080), 0x8}) [ 1148.959308] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1149.034424] 8021q: adding VLAN 0 to HW filter on device team0 [ 1149.063622] device team0 entered promiscuous mode 19:52:41 executing program 2: sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 19:52:42 executing program 3: pipe(&(0x7f00000003c0)) [ 1149.149884] device team_slave_0 entered promiscuous mode [ 1149.165287] bond0: Enslaving team0 as an active interface with an up link 19:52:42 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[], 0x50}}, 0x0) 19:52:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000003580)={0x0, 0x0, &(0x7f0000003540)={&(0x7f00000009c0)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CSA_IES={0x1ea4, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_BEACON={0x12, 0xba, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x649, 0x91, "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"}, @NL80211_ATTR_PROBE_RESP={0x381, 0x91, "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"}, @NL80211_ATTR_BEACON_TAIL={0x71, 0xf, [@rann={0x7e, 0x15, {{}, 0x0, 0x0, @device_b}}, @rann={0x7e, 0x15, {{}, 0x0, 0x0, @broadcast}}, @gcr_ga={0xbd, 0x6}, @ssid={0x0, 0x6, @default_ibss_ssid}, @channel_switch={0x25, 0x3}, @tim={0x5, 0x28, {0x0, 0x0, 0x0, "624ebcac3214fd9b10b9a3d009d08e2698bb7c3244b77371b545171cc213734e4bb38bea28"}}]}, @NL80211_ATTR_BEACON_HEAD={0x3a9, 0xe, {@with_ht={{{}, {}, @device_a, @broadcast, @from_mac=@device_b}}, 0x0, @default, 0x0, @void, @val={0x1, 0x4, [{}, {}, {}, {}]}, @void, @void, @void, @val={0x5, 0xf7, {0x0, 0x0, 0x0, "54646acac79860273adb5b064f744bc79b2e4d525eae0a510ba368d22b3d322ee5c20491aa993483b6bef2e00641c44689a0314b82875032510367f55d78d77d0d7b9a816ddf46134f0e35947a828d98ddfd8d8a98d1249749308278438d502b525d2a4896b0bd68313f589b42eee9dcee6c4adf0f2cbc223cd0e560eb12406ce89b65ca22520e449a1f5cd4bfa8e3660d1c486191f4b1fd7025a48c09c075b8900c525e7d84e5558c2cf6e6ca95db98a312c3955591dbe4a6e3ec8a84138b326b65cb201f97a69e278db294690bf632b8053500796a82397b8dd45cbfc4053cb9d7ca62f7f02597577685bf31ec171c244f8be9"}}, @val={0x25, 0x3}, @void, @val={0x3c, 0x4}, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @void, @void, [{0xdd, 0x85, "055c95b76dc8d6de74de85638929087d4f6229e2b3b1e93633331c9844546984ac1e6ef35bded3c0b71750f1ed9bd97fd18d78aeb7c471bf715718f4e90e5e3adfc9aa69138c258e41264cb6ac25bac0777c54c264add3ab637e7bd635e4ee5f6b5c47a3071ea4cdd1664394547c452a83056fbbd45b7d02911d1bb74035665973c39c42f5"}, {0xdd, 0x6e, "763c9d84b3b4145b1c7d51a1aa267e34d194f5ac977f3cae54099a80c8c3cc3bc5277bba2173d15c5b3f3b4665fec7a00d80df3617ebb8e3fb07a13df6c074d8a243ae2e3411269f8a739cd149a98f5a2863c23548e48b2309f55b55715dbdf9cd91eab0373df7619f1a00375dd9"}, {0xdd, 0xc5, "3b6de45c6a4f66512cc83d8d3409270684685381dbae3f8aaff5c93a2487c8bf7a2049aa12ca39c8d1e9791505b4512b90acf41652d0040519fdb406abec0854329add8aca9867096a5f9c4600f4f337b4e5681f3b6c8983767968d145cc7e2a841536929a9104a086a910e4a17db80c4f90bc431e7f532a8eae55e7a13d01a1900f27fa62988e8c15fa20b94580218e9bde916fd041b8b7f047829882d9639b40d1791d57c6d8f0710e2d8651096bbf56a780de03e407cf73a1401fef507ed02f3372edda"}, {0xdd, 0x8f, "d4a9be80e08c9bfdcd45e473d0c38246f3f8c7d54d36f998d330c54a5861b189cdc92ab1935566dcfe85341dc0f49713af57b19607e6c66967a1809c8187c64936f99303ac806988ce9ec37766c1e56e47e4a40e564def8f9032a9eb914c3e8fb69b5e56db44c310e5efd606646e6f93a54f8ecc340d6a0b269795870d28236ddc4f9c607a3bd801eec769fea3c867"}]}}, @NL80211_ATTR_FTM_RESPONDER={0x58, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x51, 0x2, "1f5807da545a3471e5182de731a724405cafe79e609a17e166c9695cc1ced7b1ec29e7d510aca32c7298810a34ba62f419f282fcc2d4e16a1c04c4b1e42a04f179a68fc7a0ce0b2082625a5b0f"}]}, @NL80211_ATTR_FTM_RESPONDER={0x4}, @NL80211_ATTR_FTM_RESPONDER={0x1040, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x5d, 0x2, "fd6ce93a2ddd65cd6250631616a85ec3bd22e513c388ef3304fc0dcc907e19fde31eb918858519d9293645e336ee744201ad353558e4795fb37d2fdb6e745030c827fad2aa1cb3596f48a1ad3020746243abeee522c3f36ede"}, @NL80211_FTM_RESP_ATTR_LCI={0x95, 0x2, "cb4d8ee96704b5af2f49bded1085da64832ff0333dbe66bb1230d7b22c87e507e6356c26d21b38ba92877865effac1ec8a2edbfcf5d6cfd37f6ec83d6e13ad75e74ad3146ed323d34d0a1a934a7a34bd0b2e3bd288ac89b60299bf21dbe2680bb870e3ba7df992b02bd3e0b350437e61761f0241981dfd28e1b1a9456f4d88b621c2b727b3cf0cc65b3cead57ba00bb1d9"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0xf41, 0x3, "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"}]}]]}]}, 0x1ec4}}, 0x0) 19:52:42 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x1, &(0x7f0000000200), 0x4) [ 1149.260458] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:42 executing program 4: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000940)={0x80000000}, 0x8) [ 1149.317998] bond0: Releasing backup interface team0 [ 1149.345337] device team0 left promiscuous mode [ 1149.366621] device team_slave_0 left promiscuous mode 19:52:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0025000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:42 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 19:52:42 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 19:52:42 executing program 2: socket$inet6(0xa, 0x0, 0x200) 19:52:42 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 19:52:42 executing program 5: r0 = getpid() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x0, 0x0}, 0x30) 19:52:42 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000001040), 0x0) 19:52:42 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, @short={0x2, 0xffff}}, 0x14, &(0x7f0000000080)={0x0}}, 0x0) 19:52:42 executing program 2: socket$inet6(0xa, 0x6, 0x1) 19:52:42 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000040)=0x20) 19:52:42 executing program 4: io_setup(0x400, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x6, 0x6, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x0, 0x0) 19:52:42 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), r1) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="84000000", @ANYRES16=r2, @ANYBLOB="01002dbd7000fcdbdf25010000000c0002003f000000000000000c00078008000100", @ANYRES32, @ANYBLOB="0c0003"], 0x84}}, 0x0) [ 1149.636700] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1149.736278] 8021q: adding VLAN 0 to HW filter on device team0 [ 1149.771574] device team0 entered promiscuous mode [ 1149.786747] device team_slave_0 entered promiscuous mode [ 1149.830467] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1149.839691] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1149.840948] bond0: Enslaving team0 as an active interface with an up link [ 1149.930941] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1149.951845] bond0: Releasing backup interface team0 [ 1149.975743] device team0 left promiscuous mode [ 1150.035146] device team_slave_0 left promiscuous mode 19:52:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0000200000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:42 executing program 1: socket(0x28, 0x1, 0x0) pipe(&(0x7f0000000440)) socket$inet_sctp(0x2, 0x5, 0x84) pselect6(0x40, &(0x7f0000000000)={0x7f}, 0x0, 0x0, 0x0, 0x0) 19:52:42 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 19:52:42 executing program 2: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240), 0xc) 19:52:42 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x14, &(0x7f0000000080)={0x0}}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_extract_tcp_res(0x0, 0x0, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) ioctl$SIOCGSTAMPNS(r2, 0x8907, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), r1) socket$kcm(0x29, 0x2, 0x0) 19:52:42 executing program 3: syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4801}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000bc0), 0xffffffffffffffff) 19:52:43 executing program 5: connect$phonet_pipe(0xffffffffffffffff, &(0x7f00000000c0)={0x23, 0x26}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)) 19:52:43 executing program 2: sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) pipe(0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, 0x0, 0x0) 19:52:43 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000580)={@val, @val, @ipv6=@gre_packet={0x0, 0x6, "a0830a", 0xfca, 0x2f, 0x0, @dev, @mcast1, {[@fragment, @hopopts={0x0, 0xe, '\x00', [@enc_lim, @generic={0x0, 0x5a, "37d4a98a22835efb79c5f998cce4d359c624fb568c728148bc3c0196ef2c73307eba044a040f6e10042c51b505da160cc68adecce7ff035b5fbd5e74ffbb9adf4bce29e91f28e255e879825b5346232b816d54cc20b91baaec73"}, @hao={0xc9, 0x10, @private2}]}, @hopopts={0x0, 0x1, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @pad1]}, @dstopts={0x0, 0x10, '\x00', [@jumbo, @enc_lim, @generic={0x0, 0x72, "5c56574433841b77341e8bf353c2cad66b06b0b53f5a35b85d4e8ef7550e33f50893790ef41d8b9353b8f3d1c19ae1f46c100e43e4898c1bab24b8970aced47f2d877bfb0ec2ad07360a9f09dedd8fb76c775d8182adab48c24a666420889c4a43c95c80b9d6c45bfb17d6c36a3dafe12f41"}, @ra]}, @hopopts={0x0, 0x18b, '\x00', [@generic={0x0, 0xc57, "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"}]}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xe, 0x0, [], "402344b078387365d05957c8dae4"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0, 0x0], "1e81c762f4947c5a88fbcfbc7deb910936fb729638606a8b999fddc87fc7ff396a95d86c80efa1cf6a82f041e51b12cc0904378f3bd8f129e015225cf0084e9eb014e3d5ade51a9dda96762ff535a716a06140dac0926c3caaaeb73bb1600b59fdd005daa0a1013d56bd6d27"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [], "64c012e4a5dc599c9072bbbb866eee41e7965fa56c4c3b6c054b5699c86adccdc2b221a797bb1686e21e8f218cf6e2ec309427d012a4a12c3fb2ec3cbe6188ccbc5b4999bd12d284fec87ad744549b3829821ed6143f0e221f9119884baf8045e1160f876f4f1aaf362231ee50f945664baf91e30a"}, {}, {}, {0x8, 0x6558, 0x0, "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"}}}}}, 0x1000) 19:52:43 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000000)=0x88) 19:52:43 executing program 4: socket(0x2b, 0x1, 0x0) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) pipe(&(0x7f0000000440)) pselect6(0x40, &(0x7f0000000000)={0x7f}, 0x0, 0x0, 0x0, 0x0) 19:52:43 executing program 2: pselect6(0x40, &(0x7f0000000f40), &(0x7f0000000f80), 0x0, &(0x7f0000001040), 0x0) [ 1150.332176] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1150.379381] 8021q: adding VLAN 0 to HW filter on device team0 [ 1150.469534] device team0 entered promiscuous mode [ 1150.494585] device team_slave_0 entered promiscuous mode [ 1150.566446] bond0: Enslaving team0 as an active interface with an up link [ 1150.608080] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1150.665488] bond0: Releasing backup interface team0 [ 1150.692359] device team0 left promiscuous mode [ 1150.707660] device team_slave_0 left promiscuous mode 19:52:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a0000640000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1150.864936] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1150.874351] 8021q: adding VLAN 0 to HW filter on device team0 [ 1150.895765] device team0 entered promiscuous mode [ 1150.910401] device team_slave_0 entered promiscuous mode [ 1150.916713] bond0: Enslaving team0 as an active interface with an up link [ 1150.965046] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1150.984003] bond0: Releasing backup interface team0 [ 1150.989669] device team0 left promiscuous mode 19:52:43 executing program 1: socket(0x1e, 0x0, 0x103) 19:52:43 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000a40)) 19:52:43 executing program 4: syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, 0x0, 0x20004010) 19:52:43 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) 19:52:43 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000400)={'wpan0\x00'}) [ 1151.016535] device team_slave_0 left promiscuous mode 19:52:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000020008000001201", 0x2e}], 0x1}, 0x0) 19:52:44 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000380)) 19:52:44 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000540)) 19:52:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x2, &(0x7f0000000000)=@raw=[@kfunc, @call], &(0x7f0000000040)='GPL\x00', 0x0, 0x9d, &(0x7f0000000080)=""/157, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) connect$phonet_pipe(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 19:52:44 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000500), r0) 19:52:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e80)={0x6, 0x3, &(0x7f0000000d40)=@framed, &(0x7f0000000dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7f) getsockname$l2tp6(r0, 0x0, 0x0) 19:52:44 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x1) 19:52:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d020000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:44 executing program 5: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLOPEN(r0, &(0x7f0000001140)={0x18}, 0x18) write$P9_RXATTRWALK(r0, &(0x7f0000001100)={0xf}, 0xf) 19:52:44 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) 19:52:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'ip6_vti0\x00'}) 19:52:44 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0xfffffdd6}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0xffffffffffffff08}}, 0x0) 19:52:44 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) timerfd_gettime(r0, 0x0) [ 1151.476344] 8021q: adding VLAN 0 to HW filter on device team0 19:52:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWCHAIN={0x14}], {0x14, 0x11, 0x2}}, 0x3c}}, 0x0) 19:52:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x3}], {0x14}}, 0x3c}}, 0x0) [ 1151.566179] device team0 entered promiscuous mode 19:52:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x140, 0x0, 0x0) [ 1151.603738] device team_slave_0 entered promiscuous mode 19:52:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={{0x14}, [], {0xf}}, 0x28}}, 0x0) 19:52:44 executing program 1: socket(0x1, 0x0, 0x40) [ 1151.672671] bond0: Enslaving team0 as an active interface with an up link 19:52:44 executing program 3: syz_mount_image$btrfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@subvol={'subvol', 0x3d, '*\x1a\\-/$]:]'}}]}) [ 1151.875346] bond0: Releasing backup interface team0 [ 1151.885261] device team0 left promiscuous mode [ 1151.890928] device team_slave_0 left promiscuous mode 19:52:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d030000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:44 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0x20}, 0x0) 19:52:44 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 19:52:44 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x4}, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240), 0x8}) 19:52:44 executing program 1: socketpair(0x2, 0x2, 0x0, &(0x7f0000001700)) 19:52:44 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, 0x0, 0xffffffffffffff8e) 19:52:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300), r0) 19:52:44 executing program 5: socketpair(0x26, 0x0, 0x0, &(0x7f0000002180)) 19:52:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x8, 0xa, 'nbd\x00'}]}, 0x1c}}, 0x0) 19:52:45 executing program 4: r0 = socket(0x26, 0x5, 0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 19:52:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) [ 1152.120686] 8021q: adding VLAN 0 to HW filter on device team0 [ 1152.141538] device team0 entered promiscuous mode 19:52:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x5421, &(0x7f0000000040)={'team_slave_0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440), r0) [ 1152.231511] nbd: must specify a device to reconfigure [ 1152.232056] device team_slave_0 entered promiscuous mode [ 1152.310006] bond0: Enslaving team0 as an active interface with an up link 19:52:45 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x14, &(0x7f0000000080)={0x0}}, 0x0) 19:52:45 executing program 3: timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0) 19:52:45 executing program 2: socketpair(0x10, 0x3, 0x8, &(0x7f0000000740)) 19:52:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x40, r1, 0xdcb3776fa2057237, 0x0, 0x0, {}, [{{@pci={{0x8, 0x5}, {0x11}}, {0x8}}, {0x6}}]}, 0x40}}, 0x0) 19:52:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d040000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:45 executing program 4: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RLOPEN(r0, &(0x7f0000001140)={0x18}, 0x18) write$P9_RWRITE(r0, &(0x7f0000000000)={0xb}, 0xb) [ 1152.387046] bond0: Releasing backup interface team0 [ 1152.398519] device team0 left promiscuous mode [ 1152.415721] device team_slave_0 left promiscuous mode 19:52:45 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) 19:52:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8906, 0x0) 19:52:45 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) 19:52:45 executing program 3: socketpair(0x2, 0x2, 0x1, &(0x7f0000001700)) [ 1152.641260] 8021q: adding VLAN 0 to HW filter on device team0 19:52:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f00000008c0)={&(0x7f0000000780)={0x10, 0x0, 0x2}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x14}, 0x33fe0}}, 0x0) [ 1152.729762] device team0 entered promiscuous mode 19:52:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8981, 0x0) 19:52:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x5421, &(0x7f0000000040)={'team_slave_0\x00'}) 19:52:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8982, &(0x7f0000000000)) 19:52:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x1000000}, 0x0) 19:52:45 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLOPEN(r0, &(0x7f0000001140)={0x18}, 0x18) write$P9_RREAD(r0, &(0x7f00000000c0)=ANY=[], 0x100b) [ 1152.807507] device team_slave_0 entered promiscuous mode [ 1152.840068] bond0: Enslaving team0 as an active interface with an up link [ 1152.950293] bond0: Releasing backup interface team0 [ 1152.956393] device team0 left promiscuous mode [ 1153.011432] device team_slave_0 left promiscuous mode 19:52:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d050000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f00000008c0)={&(0x7f0000000780), 0x2000078c, &(0x7f0000000880)={&(0x7f0000000840)={0x14}, 0x14}}, 0x0) 19:52:45 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) write$cgroup_pressure(r0, &(0x7f0000000000)={'full'}, 0x2f) 19:52:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}}, 0x0) 19:52:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)) 19:52:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000010"], 0x28}}, 0x0) 19:52:46 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000001780)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000001840)='./file0\x00', &(0x7f0000001880), 0x0, &(0x7f0000001a00)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:52:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWCHAIN={0x14}], {0x14}}, 0x3c}}, 0x0) [ 1153.232842] 8021q: adding VLAN 0 to HW filter on device team0 19:52:46 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000400), 0x620ce2, 0x0) 19:52:46 executing program 2: timer_create(0x0, &(0x7f0000001080)={0x0, 0x0, 0x63b35b1b5120d52b, @thr={0x0, 0x0}}, 0x0) 19:52:46 executing program 1: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x2081) [ 1153.326323] device team0 entered promiscuous mode [ 1153.344757] device team_slave_0 entered promiscuous mode [ 1153.358044] 9pnet: Insufficient options for proto=fd 19:52:46 executing program 4: getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 1153.413892] bond0: Enslaving team0 as an active interface with an up link [ 1153.469881] validate_nla: 7 callbacks suppressed [ 1153.469890] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1153.550245] bond0: Releasing backup interface team0 [ 1153.576531] device team0 left promiscuous mode [ 1153.618391] device team_slave_0 left promiscuous mode 19:52:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d060000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:46 executing program 2: add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "c3299d4cf9e4bd438ff304a2c4c73eb8bc99a42621f697dc34b43c046d6a929b905cd9de5de042640c3b6b02bb36120ccd7f27c908f1fb121d30427d93e3e565"}, 0x48, 0xfffffffffffffffc) 19:52:46 executing program 5: syz_emit_ethernet(0x5a, &(0x7f0000000000)={@broadcast, @multicast, @val={@void}, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "632d266ded3fa6230456faa1b0e694f4b274513118f543518c0db663a063a48bdfe7a5b02182d691631b9332f3d1084f1d4c1ec4a2b8644e3c5283b599851b44"}}}}, 0x0) 19:52:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000100000fffff300e7000000000000000a1400000012fa6b"], 0x28}}, 0x0) 19:52:46 executing program 1: openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.pending_reads\x00', 0x1c1041, 0x0) 19:52:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, 0x0) [ 1153.753642] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(r0, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d40)=[{0x28, 0x0, 0x0, "effde9bbd2378153d6b079931c017d6eb1"}], 0x28}, 0x0) 19:52:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x301}, @NFT_MSG_NEWSET={0x14, 0x9, 0xa, 0x101}], {0x14}}, 0x50}}, 0x0) 19:52:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}}, 0x0) [ 1153.840448] 8021q: adding VLAN 0 to HW filter on device team0 19:52:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000020000000000a1c000000060a01"], 0x104}}, 0x0) 19:52:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8902, 0x0) 19:52:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000540)={&(0x7f00000000c0)={0x77, 0x2, 0x8, 0x0, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}]}, 0xffffffffffffff0f}}, 0x0) [ 1153.920240] device team0 entered promiscuous mode [ 1153.925216] device team_slave_0 entered promiscuous mode [ 1153.952068] bond0: Enslaving team0 as an active interface with an up link [ 1154.049763] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1154.064390] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1154.078000] bond0: Releasing backup interface team0 [ 1154.086287] device team0 left promiscuous mode [ 1154.134221] device team_slave_0 left promiscuous mode 19:52:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d070000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:47 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000003e40)='./file0\x00', 0x871d38f64619dd20, 0x0) 19:52:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x20000146, &(0x7f0000000500)=[{&(0x7f00000001c0)="eb5e2fabe33bc93627c8f36d742bb876f615e9841f6ff44d401a6ded2e1262967a75fe0c909d74e90ea2878df8c1d438439290fac92cc6", 0x37, 0x1b}, {&(0x7f0000000200)="31a483dde894e4205e0cb1fd3479f7ad7b91dca424419c0571bd398e52582bdfbdae01a358be65a48c0706111ddcaeaeb7", 0x31, 0x8}, {&(0x7f0000000240)="3d4d8c74e88c6a4b2bc65028a29169d839ab56c5bd774962507fc0d962ff88fcec49c51ba841fe4ac5bfaddb71bc1c1dda9a455c0bc3be4e8269f1ce0f46233521b71cfdeaebf8fb1282baa65fa0401e5f63520004533ad4155c290c8e6b610b7b6457fe0c2e9ffd3dd6487c685ba8f72adce53195399384df906ef9d43103a8fca766ca02f3dfbb73ee9481f53bdd7ba9cc9b7033fbd5db5b7928b068e5", 0x9e, 0x8}, {&(0x7f00000006c0)="1cb46c16f2b68788d877c7bec77a353175cdbe28880487fc92c0adbffd0c6550826c8bc4f558b7bc400c4c7ab1550028a9422a485cba732219cdb3007637953e809bd6adce775217e1ac3abbeaa8bda7566ecdead3d524d2ccc144e3dfbecffba679651dc1d9192007db0939fc5755980e3ab71d4625160a2f40ed63516568ad4ed8a50045cfdd370bb483753147f378d7bd0574293fdc43ac8570704cfb23", 0xffffffffffffffd6, 0x9}, {&(0x7f0000000780)="24f579e2d7186299442c29012cfb84471811c9080d23c7cf55ee88601993cbf1387193ea253ad58af4fef5a899765c64e504df4104eb98b84cc78a665b5a83b534f6228302000562d9092d352294f017db1dc85d75e403866acee2e5c90611da49e74a37088da9a284c433e34f35e9946c131a3dc3b3a465d9dfb4054c617efd21156850002f600f15476cd7b026757ae92f143b19a9f780888440877819361c3d180a20c01fce65b363bfe3a93e5b39f852ae09330849dde38c1c5bc6323ee2c3146330910dc0acb7674bb825a28982ecca9aa7a3c20dc1c1a5c49a45579c9700b8759dc9ceee8d2d96093b31ed690525601f4361", 0xf5, 0x7}, {&(0x7f0000000440)="7250b8ff3380965e3245ab90a7dc0c09a4fab4fb2e36addc119adf1ada66f02ee38a0446ed5939dfa0804718a3cdfc087c379d0088abf4c68e23c58d3b9c001b2f092ac32b9485802f804d4b22de5d5eb9ccee6056899f3a3955046baa1bd007cfa161d8a99f514be94eeaa8f3f2c3240dc25d1765e1c7cf527bd6ab815c4d51882fc2aeb792346f8c421e71f054e2cca38dbf29877f5ed22d336f4b9a1ff740d7cffc98dd054d224328ea6ccebb6a05352f9ddece41516f", 0xb8, 0x6}], 0x2000040, &(0x7f00000005c0)={[{@noenospc_debug}, {@usebackuproot}, {}, {@thread_pool}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@dont_hash}]}) 19:52:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)={{0x14}, [@NFT_MSG_DELOBJ={0x18, 0x14, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_USERDATA={0x4}]}, @NFT_MSG_DELOBJ={0x1c, 0x14, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x8}]}, @NFT_MSG_NEWRULE={0x20, 0x6, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELSETELEM={0x2c, 0xe, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x2c, 0x0, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_TABLE_USERDATA={0x4}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xd4}}, 0x0) 19:52:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) 19:52:47 executing program 5: r0 = socket(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) 19:52:47 executing program 4: syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x551103) 19:52:47 executing program 5: modify_ldt$write(0x1, &(0x7f0000000080)={0xa03}, 0x10) modify_ldt$write(0x1, &(0x7f0000000040)={0x0, 0x4389a5d28c075f08}, 0x10) 19:52:47 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}]}, 0x20}}, 0x0) [ 1154.380126] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(r0, &(0x7f0000002140)={0x0, 0x0, 0x0}, 0x0) 19:52:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x5452, &(0x7f0000000040)={'team_slave_0\x00'}) [ 1154.488549] 8021q: adding VLAN 0 to HW filter on device team0 19:52:47 executing program 5: pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) [ 1154.554397] nbd: must specify a device to reconfigure [ 1154.571702] device team0 entered promiscuous mode [ 1154.592192] device team_slave_0 entered promiscuous mode [ 1154.653052] bond0: Enslaving team0 as an active interface with an up link [ 1154.705951] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1154.779311] bond0: Releasing backup interface team0 [ 1154.804263] device team0 left promiscuous mode [ 1154.840165] device team_slave_0 left promiscuous mode 19:52:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d080000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:47 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x5411, 0x0) [ 1154.981624] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1155.040879] 8021q: adding VLAN 0 to HW filter on device team0 [ 1155.083393] device team0 entered promiscuous mode [ 1155.104583] device team_slave_0 entered promiscuous mode [ 1155.158168] bond0: Enslaving team0 as an active interface with an up link [ 1155.202459] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1155.245811] bond0: Releasing backup interface team0 [ 1155.251498] device team0 left promiscuous mode [ 1155.259565] device team_slave_0 left promiscuous mode 19:52:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') read$FUSE(r0, &(0x7f000000d780)={0x2020}, 0x2020) read$eventfd(r0, &(0x7f0000000080), 0x8) 19:52:48 executing program 3: syz_clone(0x40180400, 0x0, 0x0, 0x0, 0x0, 0x0) 19:52:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f00000008c0)={&(0x7f0000000780), 0xfffffffffffffda3, &(0x7f0000000880)={&(0x7f0000000840)={0x14}, 0x14}}, 0x0) 19:52:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1e, r1, 0xdcb3776fa2057237, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}]}, 0x40}}, 0x0) 19:52:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8982, &(0x7f0000000040)={'team_slave_0\x00'}) 19:52:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d0a0000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:48 executing program 5: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f00000015c0)=[{0x0, 0x471}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) [ 1155.508918] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1155.520572] IPVS: ftp: loaded support on port[0] = 21 19:52:48 executing program 1: clock_gettime(0x3, &(0x7f0000002080)) 19:52:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000480)='./file1\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000800)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}, {@rodir}, {@uni_xlate}]}) [ 1155.578927] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1155.608769] 8021q: adding VLAN 0 to HW filter on device team0 19:52:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 19:52:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000005a40)={&(0x7f00000043c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000005a00)={&(0x7f0000004400)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x24c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x38, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x49, 0x5, "831041838e497f8ccec1b4118942da6517cca37227d73742bf40b6db419d81803491f432921f1a2fb2a655cc89c12191a286376f8adb53620927e338414cca59640f15bc6c"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0xed, 0x5, "e881b7b73ae679c186a18805762140707a0d66a71c26c2975a44bb0ca127fd01eef9ba4ea2903adc6435f14bd35e34756a93341d5a5dc8b6f9877414a633e8dbad99d44592d0a5c5ac7b621338ca55268c118a1417f7cdc3f984ebcc128a2b261d05eaab333fb4036a512586b75085766c553ee1fe9ff6a6c988d505848f43e8e7b320e6a60664ad3dbb24446a9da0e0e88d495903f079b4bba64a06bb0297103c75f3304ccfc2e1779e814bf41273608efa9a68bc24a79c749898f460f40cfadac05b18a1fd97883556e3645c4c6a4b169b03f7a784e6b6fb0deac57fed84f7f33fd5c008663619c0"}, @ETHTOOL_A_BITSET_MASK={0x61, 0x5, "79fa82c5d4dcad4069b540165cbe750e83487909f0ce3fe48dc6a9a7036e423978e252569df1cb29e6ad20956146ce0492698d02808449b3b4e50d4fdb5f71f1979a3e27fa5b2a9eab19025cc4362b028df5afb3b3448c9848c788c43e"}, @ETHTOOL_A_BITSET_MASK={0x61, 0x5, "c8be69270e3362d3329eb19de34aefe797d66960b1e722db2545db8bdf95d63e8b4ffdf29236ef0d57ce415d644e58f1da154ff1e534789728d0f979bfdd203db921b5e0d7fccb194ff1fe70a38ca9969b437d4a7770b8bcf4056aeb9d"}]}, @ETHTOOL_A_FEATURES_WANTED={0x118, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x114, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '^\']\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, './binderfs2/custom1\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'team\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '*)-&+@-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'team\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\x12\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, '+&D)[].+\x9e]*+.\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'team\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0xb34, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xdd, 0x5, "839a71ab99e00fbb613159fd843dfcaad886d86c552addb19e9b27de3365640395244304497a2536cec07e3091a7bc6d73b7c6fb5d60c9c43550ce0af4fa17b23f393469f35f6a499e2ca900ec7946a04d19b6e912b03e81d103f136c8a4ce0a7aa2ea7f4d04d63018a9206c458d31093fc2595bafc4ee6b2b725f65346de58b8e50a6d2236a06f254b276846c8dab4b56e3f8bff078e7d374a11a4dc4f5795039652029be9eeae96e106225b70ed407e59e27bab2a2ccce57e66bcac5d025c9371de9a08bdb597c593bddc0e59a85018916abd72e92c20b99"}, @ETHTOOL_A_BITSET_VALUE={0x35, 0x4, "11d637fc985643f0909bf94db417208594e41dc59590123036692077fdefadd7a6696d53fd78a296149f862c004822d1d3"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x99, 0x5, "5b5e374618ec9a0c0263f4a1fb0e62103ee709341e21419209e156be74f4e468deadfbadd464d951cce7b06c2164b89fbc7976b81917bce5b4d912d1d1e0f4c27ca1f1024674719676fc9765ba8c176a2a062b8950d2da6b8d87bffdc1d1737da9aba02b803649662675ef1f0378bb8901ccc48ab7ddff63d3c6e55eba30a0f927a56c08bde74425200c68e962cc5f594133685478"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x59, 0x4, "9aab29203d435dfd8e95c8aa5587dbb7177c8e1044475de5bd0f09a41624e18c946a2d18aaaddcc94345e70cf7d94c9dc48a21c8a615a9b53683b07c6908030b8cfb9c40c5cd4d8ceafda40900f4225f20824fe5ac"}, @ETHTOOL_A_BITSET_VALUE={0x905, 0x4, "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"}]}]}, 0xec4}}, 0x0) [ 1155.677888] device team0 entered promiscuous mode [ 1155.689879] device team_slave_0 entered promiscuous mode [ 1155.714585] bond0: Enslaving team0 as an active interface with an up link 19:52:48 executing program 5: syz_genetlink_get_family_id$team(&(0x7f00000020c0), 0xffffffffffffffff) [ 1155.803063] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1155.811575] FAT-fs (loop4): bogus number of reserved sectors 19:52:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{@utf8}], [{@hash}]}) [ 1155.879756] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1155.879886] bond0: Releasing backup interface team0 [ 1155.927973] device team0 left promiscuous mode [ 1155.949275] device team_slave_0 left promiscuous mode 19:52:49 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000140)="a8055fd3045d060d709a505d795728b9f332563d2fdb5d46f0954082463e5e498d3cceb41316c2ea63caa1ccfc06f037175a6f85dcae6e86d22c4f24b2b07345e1fe6673cb373237a0b1aed2be66d6686c5d7fda282272380fe8cf4c670d87af0eb85c6644b116f4439dea095ff45744a6f6db2935469ed070db4a7b69790fc7d5eabd443ebf96c2c0fbd6ca679ade8b3927f359983c1709b1202a1013896cd9ba", 0xa1}, {&(0x7f0000000200)="d6d025904c2be4121911a9b75530555d7028eda81f794315041b4afac735c59a2fe1bbea7be5fbdae87364409eacc2d9542acc45a53c79195043b81a483035bbfba75d9c131e641212df8a322bff51e446668e21ffca9de384f0674c47055d34fc0197d806833d7b42f1c1061452d53c", 0xfddd}, {&(0x7f0000000300)="597ae971f71f884f090a767350153081f8efd34ec7ec3e86990e609d69a51ac36ba30a539b73f28ac2ee01b63b4a78d7776b933c951afe49194eabf261d4f7a918873ac579fc503911c593d21f59ccff13fddc5f9f2706ab08c4a2a3c7aa8dcb37662a843efcda3ba601c4fa1e42f1b70d7164b192964b580326c794e3149680c7541779b01ede93d6bd600731383339fc997cfb63df5cb701313b12d7e91094e1d6e92bded2271f674338835b59733f8b4af965ceb68bd1a189c26c5893f8c2f86b9034dad201e1283992a81baf740669257869b43cd98c7da2309da33fb0cf5ea7fd6e87e06d3a1e104df65dd982350802680dfeac48", 0xf7}], 0x4}, 0x0) 19:52:49 executing program 1: write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) 19:52:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000540)={[{@sbsector}]}) 19:52:49 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/kvm_amd', 0x0, 0x0) read$alg(r0, 0x0, 0x0) 19:52:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d0c0000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:49 executing program 4: io_setup(0x10000, &(0x7f0000000000)) io_setup(0xf5, &(0x7f0000000040)) io_destroy(0x0) 19:52:49 executing program 1: clock_adjtime(0x0, &(0x7f0000000200)) 19:52:49 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x1ff) 19:52:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000000)={'team0\x00', @ifru_addrs=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}}) [ 1156.385673] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1156.419874] 8021q: adding VLAN 0 to HW filter on device team0 19:52:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8917, &(0x7f00000006c0)={'wlan0\x00', @ifru_ivalue}) 19:52:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000008c0)={'batadv0\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000006d00)=[{{&(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000015c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @dev}}}], 0x20}}], 0x1, 0xdd86) sendmmsg$inet(r0, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)="d7", 0x1}], 0x1}}], 0x1, 0x0) 19:52:49 executing program 1: syz_genetlink_get_family_id$fou(&(0x7f0000005ac0), 0xffffffffffffffff) [ 1156.504906] device team0 entered promiscuous mode [ 1156.539777] device team_slave_0 entered promiscuous mode [ 1156.598826] bond0: Enslaving team0 as an active interface with an up link [ 1156.644672] bond0: Releasing backup interface team0 [ 1156.651357] device team0 left promiscuous mode 19:52:49 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) 19:52:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x3}]}) [ 1156.715492] device team_slave_0 left promiscuous mode 19:52:49 executing program 4: clock_settime(0x7fd688cf7000, 0x0) 19:52:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d0e0000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[], 0x3c}}, 0x0) 19:52:49 executing program 5: socket(0x11, 0x0, 0x6) 19:52:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6, @local}, 0x10) [ 1156.846961] 8021q: adding VLAN 0 to HW filter on device team0 19:52:49 executing program 4: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f00000000c0)={0x200}, &(0x7f0000000100)={0x77359400}) 19:52:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) [ 1156.947117] device team0 entered promiscuous mode 19:52:49 executing program 3: eventfd2(0x0, 0x80002) 19:52:49 executing program 5: r0 = socket(0x1e, 0x4, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000001e00)={'ip6tnl0\x00', &(0x7f0000001d80)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private2}}) 19:52:49 executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) 19:52:49 executing program 1: sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, 0x0, 0x8bd8800aed711829) 19:52:49 executing program 4: request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0) [ 1157.040085] device team_slave_0 entered promiscuous mode [ 1157.059146] bond0: Enslaving team0 as an active interface with an up link 19:52:49 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f00000004c0)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "1f846c19c9f3d22aaebd7bfcf8edbf1d95ee36dc668df3cae3ca737ed05a9b657e9a5ee01efe496e3e123c658d8b11860487538c26da1dd326ae0810cd8743"}, 0x60) [ 1157.224547] bond0: Releasing backup interface team0 [ 1157.232633] device team0 left promiscuous mode [ 1157.237764] device team_slave_0 left promiscuous mode [ 1157.303287] device team0 entered promiscuous mode [ 1157.308238] device team_slave_0 entered promiscuous mode [ 1157.313865] device team_slave_1 entered promiscuous mode 19:52:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d100000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:50 executing program 3: socketpair(0x1e, 0x0, 0x5, 0x0) syz_mount_image$hpfs(&(0x7f0000001500), &(0x7f0000001540)='./file0\x00', 0x0, 0x6, &(0x7f00000019c0)=[{&(0x7f0000001580)="d0", 0x1, 0xffff}, {&(0x7f0000001600)="1d66a4", 0x3, 0x2}, {&(0x7f0000001640)='z', 0x1}, {&(0x7f0000001680)="bee24f5d619d74a630b9d2ba7112d9d045b46da9c4dcc9a75eedc31e8180877436614501d93d6301ee6109987464106db0bf", 0x32, 0xfffffffffffffffe}, {&(0x7f00000017c0)}, {0x0}], 0x180000, &(0x7f0000001a80)={[{'(+-%@]$*!#%()]'}, {',hW+\xf6'}, {}]}) 19:52:50 executing program 4: syz_open_dev$vim2m(&(0x7f0000000040), 0x0, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) [ 1157.351718] device team0 left promiscuous mode [ 1157.358106] device team_slave_0 left promiscuous mode [ 1157.365543] device team_slave_1 left promiscuous mode 19:52:50 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "2655e89f5a3c1c7fb07fc16a625de87633cccb0c488c00feb4966864956f899e3ef602e80f9af890a5f0c1a340cb92ae35729140c35924377d7913213336d057"}, 0x48, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 19:52:50 executing program 1: r0 = socket(0x1e, 0x4, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000006c0)={'sit0\x00', &(0x7f00000003c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 19:52:50 executing program 4: syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x252240) 19:52:50 executing program 5: clock_settime(0x7cd8a8589a88744f, &(0x7f0000000180)={0x77359400}) [ 1157.430034] 8021q: adding VLAN 0 to HW filter on device team0 [ 1157.461221] device team0 entered promiscuous mode [ 1157.469483] device team_slave_0 entered promiscuous mode 19:52:50 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0x10}}, 0x0) [ 1157.522540] bond0: Enslaving team0 as an active interface with an up link [ 1157.566498] bond0: Releasing backup interface team0 19:52:50 executing program 4: add_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) 19:52:50 executing program 2: openat$vimc0(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "2655e89f5a3c1c7fb07fc16a625de87633cccb0c488c00feb4966864956f899e3ef602e80f9af890a5f0c1a340cb92ae35729140c35924377d7913213336d057"}, 0x48, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) keyctl$chown(0x4, r0, 0xee00, 0x0) 19:52:50 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000000980)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x464, 0x8, 0x0, 0x1, [{0x25c, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ALLOWEDIPS={0x19c, 0x9, 0x0, 0x1, [{0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "fcdb77ba362b83496f546b23365ccf5c6d5e4bf46fe30b52d8dde898c9182283"}, @WGPEER_A_FLAGS={0x8}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24}]}, {0x1c8, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "6b3cd70aaf138622f4d11032b106c84495d689bcfbd3cd7359dc335d55ae14fa"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @local}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "b60a842b556b1293a3d6859c910488d54eaf1025afff3735520e15ea7002d6f8"}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x160, 0x9, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}]}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}]}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_PEERS={0x568, 0x8, 0x0, 0x1, [{0x218, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x20c, 0x9, 0x0, 0x1, [{0x4}, {0x124, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x4}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast1}}]}, {0x324, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x304, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xf}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14}]}]}, @WGDEVICE_A_PEERS={0x4c0, 0x8, 0x0, 0x1, [{0x320, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x22c, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x80, 0x9, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "1799c11ca616066c43b8eb86bdf6afbd772f23c00dd1356ed070bbcc60612c8e"}]}, {0x50, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @loopback}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "03c675a359cf599f8434e13292fb2fd20f07ec4049d134a5979f976bc6729a47"}]}, {0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x148, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}]}]}]}]}, 0xec4}}, 0x0) [ 1157.633015] device team0 left promiscuous mode [ 1157.648705] device team_slave_0 left promiscuous mode 19:52:50 executing program 1: syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x80201) 19:52:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d180000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:50 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$USERIO_CMD_REGISTER(r0, 0x0, 0x0) 19:52:50 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0xa8e00, 0x0) 19:52:50 executing program 1: openat$md(0xffffffffffffff9c, &(0x7f0000002400), 0x129181, 0x0) 19:52:50 executing program 4: r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='t', 0x1, 0xffffffffffffffff) keyctl$set_timeout(0xf, r0, 0x9) 19:52:50 executing program 5: request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0) 19:52:50 executing program 1: getresgid(&(0x7f00000000c0), &(0x7f0000000100), 0x0) [ 1157.841924] 8021q: adding VLAN 0 to HW filter on device team0 [ 1157.872141] misc userio: Invalid payload size 19:52:50 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x44002, 0x0) [ 1157.927729] device team0 entered promiscuous mode 19:52:50 executing program 5: add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 19:52:50 executing program 3: add_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) [ 1157.955542] device team_slave_0 entered promiscuous mode 19:52:50 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @generic={0x0, "73d860f4352d045fd7fbf9379d0b"}, @nfc, @rc={0x1f, @fixed}}) 19:52:50 executing program 1: pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) [ 1158.041661] bond0: Enslaving team0 as an active interface with an up link [ 1158.135406] bond0: Releasing backup interface team0 [ 1158.140997] device team0 left promiscuous mode [ 1158.167267] device team_slave_0 left promiscuous mode 19:52:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d600000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000900)={'ip6_vti0\x00', &(0x7f0000000880)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2}}) 19:52:51 executing program 3: socket$inet_smc(0x2b, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000007c0)) 19:52:51 executing program 5: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, 0x0) 19:52:51 executing program 1: semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0xc52}, {0x0, 0x1000}], 0x2, &(0x7f0000000180)) 19:52:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_hci(r0, 0x0, 0xf, 0x0, &(0x7f0000000240)) 19:52:51 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x14003, 0x0) 19:52:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) 19:52:51 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) connect(r0, &(0x7f0000000040)=@l2tp={0x2, 0x0, @remote}, 0x80) 19:52:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000003c0)={'erspan0\x00', 0x0}) 19:52:51 executing program 3: syz_open_dev$dri(&(0x7f0000000080), 0x7fffffffffffffff, 0x20640) [ 1158.350849] 8021q: adding VLAN 0 to HW filter on device team0 [ 1158.360459] device team0 entered promiscuous mode [ 1158.388506] device team_slave_0 entered promiscuous mode 19:52:51 executing program 1: read$sequencer(0xffffffffffffffff, 0x0, 0x0) [ 1158.477174] bond0: Enslaving team0 as an active interface with an up link [ 1158.542814] validate_nla: 8 callbacks suppressed [ 1158.542822] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1158.583737] bond0: Releasing backup interface team0 [ 1158.649515] device team0 left promiscuous mode [ 1158.672256] device team_slave_0 left promiscuous mode 19:52:51 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000140), 0x0, 0x2) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000600)) 19:52:51 executing program 4: msgrcv(0x0, 0x0, 0x8a, 0x0, 0x0) 19:52:51 executing program 3: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000500)={0x0, 0xb}) 19:52:51 executing program 1: r0 = socket(0x1e, 0x4, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000006c0)={'sit0\x00', &(0x7f00000003c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x57, 0x0, 0x0, @remote, @mcast2}}) 19:52:51 executing program 2: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000880), 0xffffffffffffffff) 19:52:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000300ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:51 executing program 5: socketpair(0xa, 0x0, 0xda, 0x0) 19:52:51 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0xfff, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, 0x0) 19:52:51 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, 0x0, 0x0) 19:52:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1158.895673] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:51 executing program 2: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x8a, 0x0, 0x3800) 19:52:51 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000041c0)={@mcast2}, 0x14) [ 1158.967410] 8021q: adding VLAN 0 to HW filter on device team0 19:52:51 executing program 1: socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001dc0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001d80)={&(0x7f0000000980)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x464, 0x8, 0x0, 0x1, [{0x25c, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ALLOWEDIPS={0x19c, 0x9, 0x0, 0x1, [{0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "fcdb77ba362b83496f546b23365ccf5c6d5e4bf46fe30b52d8dde898c9182283"}, @WGPEER_A_FLAGS={0x8}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24}]}, {0x1c8, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "6b3cd70aaf138622f4d11032b106c84495d689bcfbd3cd7359dc335d55ae14fa"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @local}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "b60a842b556b1293a3d6859c910488d54eaf1025afff3735520e15ea7002d6f8"}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x160, 0x9, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}]}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}]}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_PEERS={0x568, 0x8, 0x0, 0x1, [{0x218, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x20c, 0x9, 0x0, 0x1, [{0x4}, {0x124, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x4}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast1}}]}, {0x324, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x304, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14}]}]}, @WGDEVICE_A_PEERS={0x4c0, 0x8, 0x0, 0x1, [{0x320, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x22c, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x80, 0x9, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "1799c11ca616066c43b8eb86bdf6afbd772f23c00dd1356ed070bbcc60612c8e"}]}, {0x50, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @loopback}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "03c675a359cf599f8434e13292fb2fd20f07ec4049d134a5979f976bc6729a47"}]}, {0x14c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x148, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}]}]}]}]}, 0xec4}}, 0x0) [ 1159.064411] device team0 entered promiscuous mode [ 1159.079974] device team_slave_0 entered promiscuous mode [ 1159.097918] bond0: Enslaving team0 as an active interface with an up link [ 1159.147070] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1159.176182] bond0: Releasing backup interface team0 [ 1159.182990] device team0 left promiscuous mode [ 1159.209066] device team_slave_0 left promiscuous mode 19:52:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c40)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1f}, 0x1c, 0x0, 0x0, &(0x7f00000014c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x8001}}, @flowinfo={{0x14, 0x29, 0xb, 0xf5}}, @dstopts={{0x18}}], 0x48}}], 0x1, 0x0) 19:52:52 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg$sock(r0, &(0x7f0000000bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 19:52:52 executing program 2: syz_mount_image$hpfs(&(0x7f0000001500), &(0x7f0000001540)='./file0\x00', 0x0, 0x3, &(0x7f00000019c0)=[{&(0x7f0000001600)="1d", 0x1}, {&(0x7f0000001680)="be", 0x1, 0xfffffffffffffffe}, {&(0x7f00000018c0)="89cbe420775a80c7eb5e37c5fd08e220463b46db3294c38e3014ed867e2c75deceb91f12ab2eefb3819cbd3d", 0x2c}], 0x0, 0x0) 19:52:52 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) 19:52:52 executing program 5: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000002540)=[{&(0x7f0000000200)="a3", 0x1}], 0x1, 0x0) 19:52:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000500ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:52 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000007d80), 0x0, 0x20300) 19:52:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) recvfrom(r0, 0x0, 0x0, 0x60, 0x0, 0x0) 19:52:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0) 19:52:52 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x4e) 19:52:52 executing program 5: request_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0) 19:52:52 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "2655e89f5a3c1c7fb07fc16a625de87633cccb0c488c00feb4966864956f899e3ef602e80f9af890a5f0c1a340cb92ae35729140c35924377d7913213336d057"}, 0x48, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0x0) 19:52:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000900)) [ 1159.884793] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:52 executing program 1: clock_gettime(0x0, &(0x7f0000000200)) 19:52:52 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000140)={@hci, {0x0}, 0x0}, 0xa0) [ 1159.956051] 8021q: adding VLAN 0 to HW filter on device team0 [ 1159.963184] device team0 entered promiscuous mode [ 1159.995676] device team_slave_0 entered promiscuous mode 19:52:52 executing program 2: socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$ax25(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1160.027761] bond0: Enslaving team0 as an active interface with an up link 19:52:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000680)={&(0x7f0000000380)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, &(0x7f0000000500)=[{0x0}, {&(0x7f00000004c0)='#', 0x1}], 0x2}, 0x0) [ 1160.118128] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1160.200160] bond0: Releasing backup interface team0 19:52:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000600ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:53 executing program 3: pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0xffffffffffffffff) 19:52:53 executing program 4: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:52:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000680)={&(0x7f0000000380)={0xa, 0x4e21, 0x0, @mcast2, 0x8000}, 0x1c, 0x0}, 0x0) 19:52:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, &(0x7f00000001c0)) 19:52:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) sendmmsg$sock(r0, &(0x7f0000001000)=[{{&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}}], 0x1, 0x0) [ 1160.274150] device team0 left promiscuous mode [ 1160.279532] device team_slave_0 left promiscuous mode 19:52:53 executing program 4: semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0xc52}, {0x0, 0x0, 0x1000}], 0x2, &(0x7f0000000180)) 19:52:53 executing program 1: syz_mount_image$udf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$udf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:52:53 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000000)=0x6) 19:52:53 executing program 2: syz_mount_image$hpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x2119010, &(0x7f0000000280)) 19:52:53 executing program 5: r0 = socket(0x23, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005e00)={'vcan0\x00'}) [ 1160.475177] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:53 executing program 4: ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000007c0)) [ 1160.540026] 8021q: adding VLAN 0 to HW filter on device team0 [ 1160.698148] device team0 entered promiscuous mode [ 1160.729814] device team_slave_0 entered promiscuous mode [ 1160.780743] bond0: Enslaving team0 as an active interface with an up link [ 1160.793635] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1160.802240] bond0: Releasing backup interface team0 [ 1160.908781] device team0 left promiscuous mode [ 1160.913477] device team_slave_0 left promiscuous mode 19:52:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000700ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 19:52:53 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000180)) 19:52:53 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) 19:52:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000780)=[{{&(0x7f0000000080)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=ANY=[], 0xe8}}], 0x1, 0x0) 19:52:53 executing program 4: syz_mount_image$hpfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000019c0)=[{&(0x7f0000001580)="d0", 0x1}, {&(0x7f0000001600)="1d", 0x1}, {&(0x7f0000001640)='z', 0x1}, {&(0x7f0000001680)="be", 0x1, 0xfffffffffffffffe}], 0x0, 0x0) 19:52:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @loopback}}) 19:52:53 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x7800, 0x7800, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast2}}}}) 19:52:53 executing program 3: socket$inet6(0xa, 0x805, 0x1) 19:52:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f00000001c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @empty}}) [ 1161.132501] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:54 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x18500, 0x0) [ 1161.225690] 8021q: adding VLAN 0 to HW filter on device team0 [ 1161.252151] device team0 entered promiscuous mode 19:52:54 executing program 3: add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) [ 1161.345823] device team_slave_0 entered promiscuous mode [ 1161.413433] bond0: Enslaving team0 as an active interface with an up link [ 1161.462412] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1161.527675] bond0: Releasing backup interface team0 [ 1161.539038] device team0 left promiscuous mode [ 1161.551116] device team_slave_0 left promiscuous mode 19:52:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000a00ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) sendmmsg$inet6(r0, &(0x7f0000006fc0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c, 0x0}}], 0x1, 0x0) 19:52:54 executing program 4: syz_mount_image$hpfs(&(0x7f0000001500), &(0x7f0000001540)='./file0\x00', 0x0, 0x4, &(0x7f00000019c0)=[{&(0x7f0000001580)="d0", 0x1, 0xffff}, {&(0x7f0000001600)="1d", 0x1}, {&(0x7f0000001640)='z', 0x1}, {&(0x7f0000001680)="bee24f5d619d74a630b9d2ba7112d9d045b46da9c4dcc9a75eedc31e8180877436614501d93d6301ee6109987464106db0bf107cde3bdac156ab426cc711b1630088a1d2d674f922578127fe0c5dc9abdadb176034ec366977433a4007a440783de5222120d2", 0x66, 0xfffffffffffffffe}], 0x180000, &(0x7f0000001a80)={[{'\xa9]%%'}, {'\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}], [{@appraise_type}]}) 19:52:54 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) connect$tipc(r0, 0x0, 0x0) 19:52:54 executing program 1: connect$tipc(0xffffffffffffffff, 0x0, 0x0) 19:52:54 executing program 5: keyctl$assume_authority(0x10, 0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 1161.702870] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:54 executing program 2: syz_mount_image$hpfs(0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0), 0x0, 0x0) [ 1161.760330] 8021q: adding VLAN 0 to HW filter on device team0 [ 1161.810613] device team0 entered promiscuous mode [ 1161.824137] device team_slave_0 entered promiscuous mode 19:52:54 executing program 5: syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x20000) 19:52:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x69) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x14) 19:52:54 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000640)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0x1c}}, 0x0) [ 1161.912443] bond0: Enslaving team0 as an active interface with an up link 19:52:54 executing program 4: request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) [ 1161.964010] bond0: Releasing backup interface team0 [ 1161.969936] device team0 left promiscuous mode 19:52:54 executing program 2: syz_mount_image$hpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1000021, &(0x7f0000001680)) [ 1162.037531] device team_slave_0 left promiscuous mode 19:52:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000c00ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:55 executing program 5: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 19:52:55 executing program 3: syz_mount_image$udf(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)) 19:52:55 executing program 2: r0 = socket(0x1e, 0x4, 0x0) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @local}}, 0x1e) 19:52:55 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 19:52:55 executing program 5: syz_open_dev$swradio(&(0x7f0000000140), 0x0, 0x2) 19:52:55 executing program 1: socketpair(0x1a, 0x0, 0x0, 0x0) 19:52:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000019c0)) [ 1162.340678] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 1162.349823] UDF-fs: Scanning with blocksize 512 failed [ 1162.349925] 8021q: adding VLAN 0 to HW filter on device team0 19:52:55 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "2655e89f5a3c1c7fb07fc16a625de87633cccb0c488c00feb4966864956f899e3ef602e80f9af890a5f0c1a340cb92ae35729140c35924377d7913213336d057"}, 0x48, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', 0x0) [ 1162.423872] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 1162.454906] device team0 entered promiscuous mode [ 1162.462695] UDF-fs: Scanning with blocksize 1024 failed 19:52:55 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000880), r0) [ 1162.480658] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found 19:52:55 executing program 1: r0 = socket(0x1e, 0x4, 0x0) recvfrom(r0, &(0x7f0000000000)=""/141, 0x8d, 0x0, 0x0, 0x0) 19:52:55 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "2655e89f5a3c1c7fb07fc16a625de87633cccb0c488c00feb4966864956f899e3ef602e80f9af890a5f0c1a340cb92ae35729140c35924377d7913213336d057"}, 0x48, 0xfffffffffffffffd) [ 1162.547508] UDF-fs: Scanning with blocksize 2048 failed [ 1162.560211] device team_slave_0 entered promiscuous mode [ 1162.569916] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 1162.584567] UDF-fs: Scanning with blocksize 4096 failed [ 1162.630634] bond0: Enslaving team0 as an active interface with an up link [ 1162.731067] bond0: Releasing backup interface team0 [ 1162.747611] device team0 left promiscuous mode [ 1162.756294] device team_slave_0 left promiscuous mode 19:52:55 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 19:52:55 executing program 4: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x1}, &(0x7f00000000c0)={0x77359400}) 19:52:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c40)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0}}], 0x1, 0x0) 19:52:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000e00ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:55 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 19:52:55 executing program 2: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000100)) 19:52:55 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000040)=0x4) 19:52:55 executing program 5: getsockopt$TIPC_NODE_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x83, 0x0, 0x0) syz_mount_image$hpfs(&(0x7f0000001500), 0x0, 0x0, 0x2, &(0x7f00000019c0)=[{0x0, 0x0, 0xffff}, {0x0}], 0x180000, &(0x7f0000001a80)) [ 1162.950462] 8021q: adding VLAN 0 to HW filter on device team0 [ 1163.028984] device team0 entered promiscuous mode 19:52:55 executing program 2: syz_mount_image$udf(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x2000c8, &(0x7f00000005c0)) [ 1163.082038] device team_slave_0 entered promiscuous mode 19:52:56 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) [ 1163.132289] bond0: Enslaving team0 as an active interface with an up link [ 1163.166046] bond0: Releasing backup interface team0 [ 1163.171699] device team0 left promiscuous mode [ 1163.203172] device team_slave_0 left promiscuous mode 19:52:56 executing program 1: r0 = socket(0x1e, 0x4, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005e00)={'vcan0\x00'}) 19:52:56 executing program 2: r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='t', 0x1, 0xffffffffffffffff) keyctl$set_timeout(0xf, r0, 0x0) 19:52:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000340)={'sit0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 19:52:56 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'gre0\x00', 0x0}) 19:52:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d001800ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:56 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=@phonet, 0x80) 19:52:56 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 19:52:56 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x140, 0x0) 19:52:56 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)="8e", 0x1}, {&(0x7f0000000140)='e', 0x1}, {&(0x7f0000000240)='3', 0x1}], 0x3}, 0x0) 19:52:56 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000001c0)='big_key\x00', 0x0, &(0x7f0000000240)='z', 0x1, r0) 19:52:56 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x111000, 0x0) [ 1163.905097] validate_nla: 5 callbacks suppressed [ 1163.905108] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:56 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x40013102, 0x0, 0x0) 19:52:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:52:56 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001240), 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 19:52:56 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000680)={&(0x7f0000000380)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000003c0)="1580d78e01a543861633291125728511267a3470e9400d86f0b60a4c40ec1da432b87b0bd5f1137e5b378d065bf5ddcfc5ea01edd4331c57379a762dcae0c364bd8c3ef45a8507e200863ee04c7b09decce69da472cf661ffc374aeb3cecfa9d6e9b3e6dc46db46ad7aeaff7523d6149c7b0c1e9ccb9d374b5378e", 0x7b}, {&(0x7f00000004c0)="231c7050dce8d769e80de4a0ab", 0xd}], 0x2, &(0x7f0000000540)=[@hopopts_2292={{0x18}}], 0x18}, 0x0) [ 1164.094470] 8021q: adding VLAN 0 to HW filter on device team0 [ 1164.165918] device team0 entered promiscuous mode [ 1164.177992] device team_slave_0 entered promiscuous mode [ 1164.204241] bond0: Enslaving team0 as an active interface with an up link 19:52:57 executing program 4: syz_mount_image$hpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)) [ 1164.263876] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1164.281456] bond0: Releasing backup interface team0 [ 1164.295156] device team0 left promiscuous mode [ 1164.321417] device team_slave_0 left promiscuous mode 19:52:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d001f00ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) sendmmsg$inet6(r0, &(0x7f0000006fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 19:52:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) 19:52:57 executing program 3: add_key(&(0x7f0000000380)='keyring\x00', 0x0, &(0x7f0000000400)='\b', 0x1, 0xfffffffffffffffe) 19:52:57 executing program 1: syz_mount_image$hpfs(0x0, 0x0, 0x0, 0x4, &(0x7f00000019c0)=[{&(0x7f0000001580)="d024", 0x2, 0xffff}, {&(0x7f0000001600)="1d", 0x1}, {&(0x7f0000001640)='z', 0x1}, {&(0x7f0000001680)="be", 0x1, 0xfffffffffffffffe}], 0x0, 0x0) 19:52:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000780)=[{{&(0x7f0000000080)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000002900000034000000040000000000000014000000000000f0"], 0xe8}}], 0x1, 0x0) 19:52:57 executing program 3: request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000280)=')^/&#%J&.$$*^#@\x00', 0xfffffffffffffff8) 19:52:57 executing program 1: openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 1164.564942] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1164.587270] 8021q: adding VLAN 0 to HW filter on device team0 [ 1164.605921] device team0 entered promiscuous mode 19:52:57 executing program 4: r0 = socket(0x1e, 0x4, 0x0) bind$pptp(r0, 0x0, 0x0) 19:52:57 executing program 2: add_key(&(0x7f0000000040)='rxrpc\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "2655e89f5a3c1c7fb07fc16a625de87633cccb0c488c00feb4966864956f899e3ef602e80f9af890a5f0c1a340cb92ae35729140c35924377d7913213336d057"}, 0x48, 0xfffffffffffffffd) [ 1164.626636] device team_slave_0 entered promiscuous mode 19:52:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000680)={&(0x7f0000000380)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@hoplimit_2292={{0x14}}, @hoplimit_2292={{0x14}}], 0x30}, 0x0) 19:52:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'tunl0\x00', 0x0}) [ 1164.700275] bond0: Enslaving team0 as an active interface with an up link [ 1164.738813] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1164.878913] bond0: Releasing backup interface team0 [ 1164.910282] device team0 left promiscuous mode [ 1164.915175] device team_slave_0 left promiscuous mode 19:52:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d655800ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:57 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvfrom(r0, 0x0, 0x0, 0x121, 0x0, 0x0) 19:52:57 executing program 2: prlimit64(0x0, 0x0, &(0x7f00000000c0), 0x0) 19:52:57 executing program 1: getsockopt$TIPC_NODE_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x83, 0x0, &(0x7f0000001780)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) 19:52:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvfrom(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 19:52:57 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) sendmmsg$sock(r0, &(0x7f00000017c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1) 19:52:57 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$sequencer(r0, &(0x7f0000000040)=""/146, 0x92) 19:52:57 executing program 2: r0 = socket$isdn_base(0x22, 0x3, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1165.087943] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:58 executing program 3: accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x1800) 19:52:58 executing program 5: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='\x00\x00\x00', 0xfffffffffffffffd) 19:52:58 executing program 4: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000001c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='z', 0x1, r0) [ 1165.201189] 8021q: adding VLAN 0 to HW filter on device team0 [ 1165.235319] device team0 entered promiscuous mode 19:52:58 executing program 2: r0 = socket$inet(0x2, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)) [ 1165.248177] device team_slave_0 entered promiscuous mode [ 1165.308076] bond0: Enslaving team0 as an active interface with an up link [ 1165.352276] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1165.399985] bond0: Releasing backup interface team0 [ 1165.421301] device team0 left promiscuous mode [ 1165.429796] device team_slave_0 left promiscuous mode 19:52:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d006000ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 19:52:58 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$vim2m_VIDIOC_QUERYCAP(r0, 0x80685600, 0x0) 19:52:58 executing program 5: syz_mount_image$hpfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000019c0)=[{&(0x7f0000001600)="1d", 0x1}], 0x0, 0x0) 19:52:58 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000500)={0x0, 0x8}) 19:52:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @sco={0x1f, @fixed}, @can, @l2={0x1f, 0x0, @any, 0x0, 0x1}}) 19:52:58 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 19:52:58 executing program 1: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f00000000c0)) 19:52:58 executing program 3: prlimit64(0x0, 0x0, &(0x7f00000000c0)={0x5f48, 0x100000000}, 0x0) 19:52:58 executing program 2: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x8a, 0x0, 0x0) 19:52:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) 19:52:58 executing program 3: r0 = socket(0x1e, 0x4, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) [ 1165.731616] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1165.837359] 8021q: adding VLAN 0 to HW filter on device team0 [ 1165.896033] device team0 entered promiscuous mode [ 1165.901124] device team_slave_0 entered promiscuous mode [ 1165.913498] bond0: Enslaving team0 as an active interface with an up link [ 1165.945037] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1165.953968] bond0: Releasing backup interface team0 [ 1165.996328] device team0 left promiscuous mode [ 1166.015045] device team_slave_0 left promiscuous mode 19:52:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d586500ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:59 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d1c, 0x0) 19:52:59 executing program 4: syz_mount_image$udf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$udf(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)) 19:52:59 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), 0x4) [ 1166.237831] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:52:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) bind(r0, 0x0, 0x0) 19:52:59 executing program 3: add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='t', 0x1, 0xffffffffffffffff) 19:52:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) 19:52:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x20, r1, 0x1, 0x0, 0x0, {0x2}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) [ 1166.328223] 8021q: adding VLAN 0 to HW filter on device team0 19:52:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000080)={0x0, 0xe00}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x0) [ 1166.421849] device team0 entered promiscuous mode [ 1166.461477] device team_slave_0 entered promiscuous mode [ 1166.520743] bond0: Enslaving team0 as an active interface with an up link [ 1166.561898] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1166.581101] bond0: Releasing backup interface team0 19:52:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r1, r0) 19:52:59 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000002bc0)={&(0x7f0000002600)=@in={0x10, 0x2}, 0x10, &(0x7f0000002b00)=[{&(0x7f0000002640)="be", 0x1}], 0x1, &(0x7f0000002b80)=[@prinfo={0x14}], 0x14}, 0x0) 19:52:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140), &(0x7f0000000240)=0x98) [ 1166.628335] device team0 left promiscuous mode [ 1166.672980] device team_slave_0 left promiscuous mode 19:52:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d008100ba8000001201", 0x2e}], 0x1}, 0x0) 19:52:59 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f00000001c0), 0x4) r1 = dup2(r0, r0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r4 = dup2(r3, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000000)={r5, 0x0, 0x0, 0x1}, 0x14) 19:52:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x28, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r3}, &(0x7f0000000100)=0x10) 19:52:59 executing program 3: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x0) 19:52:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000380), 0xc) 19:52:59 executing program 2: setitimer(0x2, &(0x7f0000000700)={{0x3}, {0x5b3d}}, 0x0) 19:52:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000000), &(0x7f0000000180)=0x8) [ 1166.937577] 8021q: adding VLAN 0 to HW filter on device team0 [ 1166.977995] device team0 entered promiscuous mode 19:52:59 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 19:52:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000140), 0x8) 19:52:59 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000300)={0x1c, 0x1c, 0x1}, 0x1c) 19:52:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000200), 0x8) [ 1167.046616] device team_slave_0 entered promiscuous mode [ 1167.052840] bond0: Enslaving team0 as an active interface with an up link 19:53:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000200), 0x4) [ 1167.177090] bond0: Releasing backup interface team0 [ 1167.185556] device team0 left promiscuous mode [ 1167.249222] device team_slave_0 left promiscuous mode 19:53:00 executing program 3: socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) 19:53:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000040)="e0", 0x1}], 0x1, &(0x7f0000000300)=[@authinfo={0x10}], 0x10}, 0x0) 19:53:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000013c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000001340)=[{&(0x7f00000000c0)="05", 0x1}], 0x1}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000100)='<', 0x1}], 0x1, 0x0, 0x1c}, 0x20189) 19:53:00 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x18}, 0x98) 19:53:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000200ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000140)={0x1c, 0x1c, 0x2}, 0x1c) 19:53:00 executing program 2: getresgid(0x0, &(0x7f0000001080), 0x0) 19:53:00 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 19:53:00 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x8}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000001c0), 0x8) 19:53:00 executing program 1: socketpair(0x10, 0x0, 0x20, 0x0) 19:53:00 executing program 4: setgroups(0x0, 0x0) setresgid(0x0, 0x0, 0xffffffffffffffff) 19:53:00 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) [ 1167.638145] 8021q: adding VLAN 0 to HW filter on device team0 [ 1167.667007] device team0 entered promiscuous mode 19:53:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="e0", 0x1}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB=' '], 0x1c}, 0x0) [ 1167.737207] device team_slave_0 entered promiscuous mode [ 1167.744671] bond0: Enslaving team0 as an active interface with an up link 19:53:00 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x28, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), &(0x7f0000000100)=0xc) [ 1167.796807] bond0: Releasing backup interface team0 19:53:00 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f00000001c0), 0x4) r1 = dup2(r0, r0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r4 = dup2(r3, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000000)={r5, 0x0, 0x0, 0xab9, 0xc3f8}, 0x14) 19:53:00 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)=ANY=[], 0x8c}, 0x0) [ 1167.858578] device team0 left promiscuous mode [ 1167.874577] device team_slave_0 left promiscuous mode 19:53:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000300ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), 0x98) 19:53:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}, 0x14) 19:53:00 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000080), 0x8) 19:53:00 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f00000001c0)=ANY=[@ANYBLOB="01"], &(0x7f00000002c0)=0x8) 19:53:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000280)="904641e005c8ae554658f3346a175cb6a1134d597d8bf9dfcb6db1ecd40b8afca3bccfab1784cd761a386e07a61ae62f730cab4bc2f5427a65c747a0eff335dd4ad8d85ecd53e79249e6a114643ad5d4e5ddc4d97f2651fb0dce6e5c9b0ed02c9ff0ddc1bca2e7c9c4c83cfc4af77d04431821d1af261983fa0b88b0d69423c48ece9e008917b9b6c53f9dd69dd51bf0b5d5bc9199f2c1328864f5b27f2ca5def321be4c0065497746836d2a1f3a8419e227c7e5e8603b5804ca87c04c9d16626ae158f572fdcfd3642259f53d8fbc7b422f0a1dda914d1505ecf3", 0xdb, 0x1, &(0x7f0000000240)={0x10, 0x2}, 0x5a) 19:53:01 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000000), 0x90) 19:53:01 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000002380)={0x0, 0x0, &(0x7f00000022c0)=[{0x0}], 0x1}, 0x0) [ 1168.215047] 8021q: adding VLAN 0 to HW filter on device team0 19:53:01 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000300), &(0x7f0000000340)=0x8) 19:53:01 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 19:53:01 executing program 5: socketpair(0x2, 0x3, 0x80, 0x0) [ 1168.300858] device team0 entered promiscuous mode [ 1168.311494] device team_slave_0 entered promiscuous mode 19:53:01 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f00000001c0)={0x0, 0xfd}, 0x8) [ 1168.358443] bond0: Enslaving team0 as an active interface with an up link [ 1168.393636] bond0: Releasing backup interface team0 [ 1168.399648] device team0 left promiscuous mode [ 1168.488773] device team_slave_0 left promiscuous mode 19:53:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000400ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:01 executing program 1: getgroups(0x1, &(0x7f0000000bc0)=[0x0]) 19:53:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000080), &(0x7f0000000100)=0x8) 19:53:01 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r1, r0) 19:53:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x25) 19:53:01 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getpeername(r0, 0x0, &(0x7f0000000040)) 19:53:01 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000500)=ANY=[@ANYBLOB="0004"], 0x4) 19:53:01 executing program 4: accept4(0xffffffffffffffff, &(0x7f0000000380)=@in, &(0x7f00000003c0)=0x10, 0x0) 19:53:01 executing program 5: lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) lchown(&(0x7f0000000b40)='./file0\x00', 0x0, 0x0) lchown(&(0x7f0000000bc0)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000c00)='./file0\x00', 0x0, 0x0) 19:53:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) getsockname$inet(r0, 0x0, &(0x7f0000000100)) 19:53:01 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000100), 0x8) [ 1168.768571] 8021q: adding VLAN 0 to HW filter on device team0 [ 1168.804741] device team0 entered promiscuous mode 19:53:01 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) [ 1168.872447] sctp: [Deprecated]: syz-executor.1 (pid 24813) Use of int in max_burst socket option deprecated. [ 1168.872447] Use struct sctp_assoc_value instead [ 1168.881101] device team_slave_0 entered promiscuous mode [ 1168.986404] bond0: Enslaving team0 as an active interface with an up link [ 1169.038384] validate_nla: 7 callbacks suppressed [ 1169.038394] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1169.130469] bond0: Releasing backup interface team0 19:53:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000500ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:02 executing program 4: pipe2(&(0x7f0000000540), 0x0) 19:53:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000280), 0x14) 19:53:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000080)={0x16}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x184) 19:53:02 executing program 2: socketpair(0x0, 0x0, 0x7f, 0x0) 19:53:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0xe57, 0x39}, 0x10) [ 1169.175445] device team0 left promiscuous mode [ 1169.180162] device team_slave_0 left promiscuous mode 19:53:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}, @sndinfo={0x1c}], 0x38}, 0x184) 19:53:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000000)={0x0, 0x2, "450e"}, &(0x7f0000000100)=0xa) 19:53:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000002640)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000002540)=[{&(0x7f0000000040)='\"', 0x1}], 0x1, &(0x7f00000025c0)=[@dstaddrv4={0x10, 0x84, 0x9}], 0x10}, 0x0) [ 1169.347585] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:53:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080)={0x0, @in, 0x2, 0x0, 0xc, 0x0, 0xcc}, 0x98) [ 1169.501705] 8021q: adding VLAN 0 to HW filter on device team0 19:53:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 19:53:02 executing program 5: setitimer(0x0, &(0x7f0000000700)={{}, {0x0, 0x4}}, 0x0) [ 1169.592968] device team0 entered promiscuous mode [ 1169.625405] device team_slave_0 entered promiscuous mode [ 1169.704593] bond0: Enslaving team0 as an active interface with an up link [ 1169.745230] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1169.798155] bond0: Releasing backup interface team0 [ 1169.826953] device team0 left promiscuous mode [ 1169.831570] device team_slave_0 left promiscuous mode 19:53:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000600ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:02 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f00000001c0), 0x4) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000002580)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000002440)=[{&(0x7f0000000200)='j', 0x1}], 0x1, &(0x7f00000024c0)=[@authinfo={0x10}, @prinfo={0x14}, @sndinfo={0x1c}, @init={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @broadcast}, @dstaddrv6={0x1c, 0x84, 0xa, @ipv4={'\x00', '\xff\xff', @loopback}}, @dstaddrv4={0x10, 0x84, 0x9, @multicast2}, @dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}], 0xac}, 0x0) 19:53:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140), 0x98) 19:53:02 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) 19:53:02 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=[@cred, @cred], 0xd0}, 0x0) 19:53:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000200)="7f", 0x1, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) 19:53:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001380)={&(0x7f0000000e40)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000001480)=ANY=[], 0x8c}, 0x0) 19:53:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x0, 0x0, 0x100}, 0x98) 19:53:03 executing program 2: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}], 0x1c}, 0x0) 19:53:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000000)={0x2, [0x0, 0x0]}, &(0x7f0000000540)=0x8) 19:53:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000100), 0x8) 19:53:03 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, &(0x7f0000000000), 0x8) [ 1170.311341] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1170.417078] 8021q: adding VLAN 0 to HW filter on device team0 [ 1170.448917] device team0 entered promiscuous mode [ 1170.468184] device team_slave_0 entered promiscuous mode [ 1170.529828] bond0: Enslaving team0 as an active interface with an up link [ 1170.559264] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1170.614998] bond0: Releasing backup interface team0 [ 1170.629866] device team0 left promiscuous mode [ 1170.642115] device team_slave_0 left promiscuous mode 19:53:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000700ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:03 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000)={0x400, 0x1000}, 0x8) r1 = socket(0x2, 0x1, 0x0) dup2(r1, r0) 19:53:03 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000540)=0x4) 19:53:03 executing program 4: writev(0xffffffffffffffff, &(0x7f00000049c0)=[{0x0}, {0x0}], 0x2) 19:53:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000140)={&(0x7f0000000180)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0), 0x8c) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280), 0x88) 19:53:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000001480)=[{&(0x7f0000000040)='Z', 0x1}], 0x1}, 0x0) 19:53:03 executing program 4: getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x108, 0x0, 0xffffffffffffffff) [ 1170.824289] sctp: [Deprecated]: syz-executor.2 (pid 24903) Use of int in max_burst socket option. [ 1170.824289] Use struct sctp_assoc_value instead 19:53:03 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000001540)={0x10, 0x2}, 0x10) connect$inet(r1, &(0x7f0000000900)={0x48, 0x2}, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$inet_sctp(r2, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002b40)=[{&(0x7f0000000040)='C', 0x1}], 0x1}, 0x0) 19:53:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, 0x0, 0x0) 19:53:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000280)=[{&(0x7f00000000c0)="833111052a85841d483039b6fbd373ad48c26559cd364efde2808a3ba9dde0dffe382eba1463e56ecda12415e0ece6b3fdac808b5826fd72b2b08019b3279a14f5fef55f5411e59ab349c8a987ca00"/88, 0x58}], 0x1, &(0x7f0000000080)=[@sndinfo={0xb}], 0x1c}, 0x0) 19:53:03 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) getsockname$inet(r0, 0x0, &(0x7f00000000c0)) [ 1171.048475] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:53:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c) [ 1171.117815] 8021q: adding VLAN 0 to HW filter on device team0 [ 1171.168479] device team0 entered promiscuous mode [ 1171.214515] device team_slave_0 entered promiscuous mode [ 1171.242114] bond0: Enslaving team0 as an active interface with an up link [ 1171.282397] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1171.369184] bond0: Releasing backup interface team0 [ 1171.378182] device team0 left promiscuous mode [ 1171.427403] device team_slave_0 left promiscuous mode 19:53:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000800ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000140), 0x8) 19:53:04 executing program 3: getresgid(&(0x7f0000001040), 0x0, &(0x7f00000010c0)) 19:53:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000002c0), 0x98) 19:53:04 executing program 2: getresuid(0x0, 0x0, &(0x7f0000000a80)) 19:53:04 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000780)="1c", 0x1, 0x0, &(0x7f0000000480)={0x1c, 0x1c, 0x3}, 0x1c) 19:53:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x1f, 0x0, 0x5}, 0x10) 19:53:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0xfffffff9, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) 19:53:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000200), 0x4) 19:53:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000180), &(0x7f0000000240)=0x98) [ 1171.687031] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:53:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 19:53:04 executing program 2: setgroups(0x1, &(0x7f0000000b40)=[0x0]) [ 1171.776572] 8021q: adding VLAN 0 to HW filter on device team0 [ 1171.852587] device team0 entered promiscuous mode [ 1171.885238] device team_slave_0 entered promiscuous mode [ 1171.948675] bond0: Enslaving team0 as an active interface with an up link [ 1171.997765] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1172.007135] bond0: Releasing backup interface team0 [ 1172.058360] device team0 left promiscuous mode [ 1172.068644] device team_slave_0 left promiscuous mode 19:53:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000a00ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002b00)={&(0x7f0000000540)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000002ac0)=[@sndinfo={0x1c}], 0x1c}, 0x0) 19:53:05 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) listen(r0, 0x2) 19:53:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000006c0)={&(0x7f00000003c0), 0x10, &(0x7f0000000640)=[{&(0x7f0000000400)="02", 0x1}], 0x1, &(0x7f0000000680)=[@prinfo={0x18, 0x84, 0x5, {0x20}}], 0x18}, 0x0) 19:53:05 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f0000003280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003200)}, 0x0) 19:53:05 executing program 2: shmget(0x2, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 19:53:05 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/198, 0xc6}, 0x80043) 19:53:05 executing program 1: getresuid(0x0, &(0x7f0000000a40), &(0x7f0000000a80)) 19:53:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 19:53:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000000400)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x28, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000500)={0x1000, 0x0, 0x0, 0x0, r2}, 0x10) [ 1172.346222] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1172.374322] 8021q: adding VLAN 0 to HW filter on device team0 [ 1172.457662] device team0 entered promiscuous mode 19:53:05 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000000), 0x0) 19:53:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140), 0x98) [ 1172.478602] device team_slave_0 entered promiscuous mode [ 1172.509711] bond0: Enslaving team0 as an active interface with an up link [ 1172.615349] bond0: Releasing backup interface team0 [ 1172.669619] device team0 left promiscuous mode [ 1172.684314] device team_slave_0 left promiscuous mode 19:53:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000c00ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000001c0), 0x90) 19:53:05 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) shutdown(r0, 0x0) 19:53:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="04", 0x1}], 0x1, &(0x7f00000001c0)=[@prinfo={0x14}], 0x14}, 0x0) 19:53:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080)={0x0, @in, 0x0, 0x400, 0x92}, 0x98) 19:53:05 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0xa}, 0xa) 19:53:05 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='cdg\x00', 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000140)='cdg\x00', 0x4) [ 1172.980777] 8021q: adding VLAN 0 to HW filter on device team0 19:53:05 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) [ 1173.028868] device team0 entered promiscuous mode 19:53:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002ac0)=[@sndinfo={0x1c}], 0x1c}, 0x0) 19:53:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000000)=0x8) 19:53:05 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x80000000}, 0x14) 19:53:06 executing program 1: getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) [ 1173.181187] device team_slave_0 entered promiscuous mode [ 1173.234002] bond0: Enslaving team0 as an active interface with an up link [ 1173.405232] bond0: Releasing backup interface team0 [ 1173.410755] device team0 left promiscuous mode [ 1173.428509] device team_slave_0 left promiscuous mode 19:53:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000e00ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:06 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x11, &(0x7f0000000140), 0x4) 19:53:06 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x872, 0x92}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) 19:53:06 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000380), 0x98) 19:53:06 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, 0x0, 0x0) 19:53:06 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r4 = dup2(r3, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x108, &(0x7f0000000000)={r5, 0x0, 0xf}, &(0x7f0000000040)=0x18) 19:53:06 executing program 4: syz_clone(0x51020040, 0x0, 0x0, 0x0, 0x0, 0x0) 19:53:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x1, &(0x7f0000000200)=@raw=[@alu={0x7}], &(0x7f0000000240)='syzkaller\x00', 0x3, 0x80, &(0x7f0000000280)=""/128, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1173.744082] 8021q: adding VLAN 0 to HW filter on device team0 19:53:06 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'ip6tnl0\x00', 0x2000}) syz_clone(0x40002000, &(0x7f0000000180)="26382e021eec3cacfc8b56b4ff8e80c352988aa484c6e25ddfdbe5dd931ef9c273380ac7cf93459e53085949bab6be56f796c4c21c84e89fb0a49986d9b8126503aee9a040dfc634a0482a352f87507b481f3e8d3a4951a2f8b1ff5d7f7fd3e392909bfab4171e3cf0a6dcacc2fcca91e90267b33369747940c0356296b75f142118ddb79872603a1f7167bed3fec4d94a0aa095515b92e1aa15e3669624a4d10a81d12fcb593567f9df1c509178a0fcd604a2a0443e3bdf38", 0xb9, &(0x7f0000000280), &(0x7f00000002c0), 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000000)) 19:53:06 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'macsec0\x00', 0x3001}) [ 1173.823451] device team0 entered promiscuous mode [ 1173.849475] device team_slave_0 entered promiscuous mode 19:53:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"/1320], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x1c, 0xf000, &(0x7f0000000800)="b95b2d3f6ef7a007675a40f0888ec16db0f6095b9d387cdeb526a233", 0x0, 0x3b, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1173.903040] bond0: Enslaving team0 as an active interface with an up link [ 1173.940662] bond0: Releasing backup interface team0 [ 1173.948458] device team0 left promiscuous mode 19:53:06 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, 0x0}, 0x20) [ 1174.036610] IPVS: ftp: loaded support on port[0] = 21 [ 1174.049593] device team_slave_0 left promiscuous mode 19:53:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d001000ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x3f}, 0x0, 0x5, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd66}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x80, 0x4, 0x40, 0x3, 0x0, 0x3, 0xedb73314b8b4a9c4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x7d, 0x8000}, 0x41, 0x100000001, 0x4, 0x9, 0x3c, 0x2, 0x8000, 0x0, 0x4, 0x0, 0xd4}, 0xffffffffffffffff, 0xc, r1, 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r2, 0xe) openat$cgroup_ro(r0, &(0x7f00000000c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000a40)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xb0\xfbk\x95\xeag{\xa9\x82\r\xc3\xf4&\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xeb\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:53:07 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002ac0)={&(0x7f0000002a00)='./file0\x00'}, 0x10) [ 1174.209304] IPVS: ftp: loaded support on port[0] = 21 19:53:07 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000b00)={&(0x7f0000000280)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "121c02a807e6ce2e05e55b3ceea67be32c19f3b0d4eb52822c88cdd643a33ffc8508768d597d1161f02254be672c309155502a5ab4a2f25450bc98d1281588"}, 0x80, 0x0, 0x0, &(0x7f0000000a80)=[@mark={{0x14}}, @mark={{0x14}}], 0x30}, 0x0) 19:53:07 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1, 0x2, 0x2, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 19:53:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d001800ba8000001201", 0x2e}], 0x1}, 0x0) [ 1174.661488] validate_nla: 5 callbacks suppressed [ 1174.661498] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:53:07 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41004}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8937, &(0x7f0000000080)) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1d, 0xad0a, 0x8000, 0xffff, 0x241, r1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)=0xc9ab) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x4}, @generic={0x2, 0x8, 0x8, 0x101, 0xa8}, @cb_func={0x18, 0xa}, @ldst={0x0, 0x0, 0x0, 0x4, 0x0, 0x18}, @kfunc, @btf_id, @call, @exit], 0x0, 0x1, 0xfff, &(0x7f0000000d80)=""/4095, 0x41000, 0x8, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x0, 0x100, 0x800}, 0x10, 0x2669a, r2, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r1, 0xffffffffffffffff]}, 0x80) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) openat$cgroup_procs(r5, 0x0, 0x2, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) 19:53:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'ip6tnl0\x00', 0x1}) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) 19:53:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000001e40)={0x0, 0x0, &(0x7f0000001c40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 19:53:07 executing program 1: syz_clone(0x40002000, &(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000300)="58e5478276108b3855faf250397a7a8d726cbce0898e9bed6c15f079148e5b97683f9ded72") [ 1174.761389] 8021q: adding VLAN 0 to HW filter on device team0 [ 1174.810773] device team0 entered promiscuous mode [ 1174.839918] device team_slave_0 entered promiscuous mode [ 1174.867359] bond0: Enslaving team0 as an active interface with an up link 19:53:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000140)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000001340)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1174.922867] IPVS: ftp: loaded support on port[0] = 21 [ 1174.928348] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1174.962683] bond0: Releasing backup interface team0 [ 1175.016509] device team0 left promiscuous mode [ 1175.025160] device team_slave_0 left promiscuous mode 19:53:07 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'macsec0\x00', 0x3001}) 19:53:08 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41004}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8937, &(0x7f0000000080)) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1d, 0xad0a, 0x8000, 0xffff, 0x241, r1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)=0xc9ab) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x4}, @generic={0x2, 0x8, 0x8, 0x101, 0xa8}, @cb_func={0x18, 0xa}, @ldst={0x0, 0x0, 0x0, 0x4, 0x0, 0x18}, @kfunc, @btf_id, @call, @exit], 0x0, 0x1, 0xfff, &(0x7f0000000d80)=""/4095, 0x41000, 0x8, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x0, 0x100, 0x800}, 0x10, 0x2669a, r2, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r1, 0xffffffffffffffff]}, 0x80) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) openat$cgroup_procs(r5, 0x0, 0x2, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) 19:53:08 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8002, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000200)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'bond0\x00', 0x2}) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x90ad) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'veth0_macvtap\x00', @multicast}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000140)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0x3, 0x2, 0x6, 0x0, 0x0, 0x7ff, 0x8, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x6}, 0x8900, 0x3, 0x10001, 0x7, 0xc0, 0x7d, 0x9d, 0x0, 0x5, 0x0, 0x60}, r4, 0x7, 0xffffffffffffffff, 0x0) 19:53:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d006000ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:08 executing program 5: syz_clone(0x69002400, 0x0, 0x46, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1175.341557] device lo entered promiscuous mode [ 1175.578687] IPVS: ftp: loaded support on port[0] = 21 [ 1176.069907] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1176.087159] 8021q: adding VLAN 0 to HW filter on device team0 [ 1176.141651] device team0 entered promiscuous mode [ 1176.176606] device team_slave_0 entered promiscuous mode [ 1176.194392] bond0: Enslaving team0 as an active interface with an up link [ 1176.247663] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1176.478117] bond0: Releasing backup interface team0 [ 1176.494222] device team0 left promiscuous mode [ 1176.498925] device team_slave_0 left promiscuous mode [ 1178.396942] ieee802154 phy0 wpan0: encryption failed: -22 [ 1178.402576] ieee802154 phy1 wpan1: encryption failed: -22 19:53:11 executing program 3: syz_mount_image$squashfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x44b, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{'\x00'}]}) 19:53:11 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) accept4(r0, &(0x7f0000000000)=@in, &(0x7f0000000080)=0x10, 0x0) 19:53:11 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41004}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8937, &(0x7f0000000080)) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1d, 0xad0a, 0x8000, 0xffff, 0x241, r1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)=0xc9ab) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x4}, @generic={0x2, 0x8, 0x8, 0x101, 0xa8}, @cb_func={0x18, 0xa}, @ldst={0x0, 0x0, 0x0, 0x4, 0x0, 0x18}, @kfunc, @btf_id, @call, @exit], 0x0, 0x1, 0xfff, &(0x7f0000000d80)=""/4095, 0x41000, 0x8, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x0, 0x100, 0x800}, 0x10, 0x2669a, r2, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r1, 0xffffffffffffffff]}, 0x80) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) openat$cgroup_procs(r5, 0x0, 0x2, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) 19:53:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000003ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:11 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "27fa154e1a0180b0eba8fcca01d1db876ae336d7c7f5a696d59f4b1ea8a1f36c390db4e680787ba86f46cafbcdd1387629d88632814ae021fff295509479bbda"}, 0x48, r0) keyctl$KEYCTL_MOVE(0x4, r1, 0xfffffffffffffffd, 0x0, 0x0) 19:53:11 executing program 2: syz_clone(0x20209100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1178.617328] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1178.659339] 8021q: adding VLAN 0 to HW filter on device team0 [ 1178.710736] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 1178.742117] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 1178.755007] device team0 entered promiscuous mode 19:53:11 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r0, 0x40044160, 0x0) 19:53:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000740)={[{@errors_remount}, {@iocharset={'iocharset', 0x3d, 'macinuit'}}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 1178.824513] device team_slave_0 entered promiscuous mode [ 1178.854103] bond0: Enslaving team0 as an active interface with an up link 19:53:11 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@default, @null, @null, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) 19:53:11 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41004}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8937, &(0x7f0000000080)) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1d, 0xad0a, 0x8000, 0xffff, 0x241, r1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)=0xc9ab) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x4}, @generic={0x2, 0x8, 0x8, 0x101, 0xa8}, @cb_func={0x18, 0xa}, @ldst={0x0, 0x0, 0x0, 0x4, 0x0, 0x18}, @kfunc, @btf_id, @call, @exit], 0x0, 0x1, 0xfff, &(0x7f0000000d80)=""/4095, 0x41000, 0x8, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x0, 0x100, 0x800}, 0x10, 0x2669a, r2, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r1, 0xffffffffffffffff]}, 0x80) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r4}, 0x8) openat$cgroup_procs(r5, 0x0, 0x2, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) [ 1178.951218] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:53:11 executing program 2: r0 = socket(0x2, 0x3, 0x101) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1179.023008] bond0: Releasing backup interface team0 [ 1179.049888] device team0 left promiscuous mode [ 1179.064116] device team_slave_0 left promiscuous mode 19:53:15 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x41) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x41, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x0, 0x100, 0x338, 0xffffffff, 0xffffffff, 0x438, 0x438, 0x438, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @mcast1, [], [], 'vxcan1\x00', 'ipvlan0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, [], [], 'veth0_virt_wifi\x00', 'xfrm0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@dev, @private2, [], [], 'veth1_macvtap\x00', 'bond0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) 19:53:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x41) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x11, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x0, 0x100, 0x338, 0xffffffff, 0xffffffff, 0x438, 0x438, 0x438, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @mcast1, [], [], 'vxcan1\x00', 'ipvlan0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, [], [], 'veth0_virt_wifi\x00', 'xfrm0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@dev, @private2, [], [], 'veth1_macvtap\x00', 'bond0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) 19:53:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x41) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x36, 0x0, 0x7) 19:53:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000005ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg0\x00'}) 19:53:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_mreqn(r0, 0x0, 0xe, 0x0, &(0x7f0000000040)) 19:53:15 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), r1) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="84000000", @ANYRES16=r2, @ANYBLOB="01002dbd7000fcdbdf25010000000c0002003f000000000000000c00078008000100", @ANYRES32, @ANYBLOB="0c0003007f"], 0x84}}, 0x0) 19:53:15 executing program 5: r0 = socket(0x2, 0x3, 0xff) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x29, 0x0, 0x0) 19:53:15 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000340)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000100)=[{}], 0x0}, &(0x7f0000000140)=0x78) 19:53:15 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={[0x200]}, 0x8}) 19:53:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000007140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000) [ 1182.697283] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:53:15 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000003b80), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000940)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0) 19:53:15 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000001500), 0x8) [ 1182.793301] 8021q: adding VLAN 0 to HW filter on device team0 [ 1182.850229] device team0 entered promiscuous mode [ 1182.855424] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 19:53:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x10}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e}, 0xb) [ 1182.900835] device team_slave_0 entered promiscuous mode [ 1182.935667] bond0: Enslaving team0 as an active interface with an up link 19:53:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xf, 0x4, 0x0, 0x7, 0x0, 0x1}, 0x48) [ 1183.007606] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1183.023889] bond0: Releasing backup interface team0 [ 1183.046960] device team0 left promiscuous mode [ 1183.109682] device team_slave_0 left promiscuous mode 19:53:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000006ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x7c65c9ed7af15d6b, 0x0, 0x0, {0x7}}, 0x14}}, 0x0) 19:53:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000e00ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d0a0000ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090020000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1183.253833] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1183.303305] device team0 left promiscuous mode 19:53:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090e0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1183.335668] device team_slave_0 left promiscuous mode [ 1183.345580] device team_slave_1 left promiscuous mode [ 1183.364322] bridge0: port 3(team0) entered disabled state [ 1183.430724] 8021q: adding VLAN 0 to HW filter on device team0 [ 1183.454491] bond0: Enslaving team0 as an active interface with an up link [ 1183.506955] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1183.524237] 8021q: adding VLAN 0 to HW filter on device team0 [ 1183.555304] device team0 entered promiscuous mode [ 1183.560442] device team_slave_0 entered promiscuous mode [ 1183.637792] bond0: Enslaving team0 as an active interface with an up link [ 1183.660240] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 19:53:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009020e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1184.394336] 8021q: adding VLAN 0 to HW filter on device team0 [ 1184.465998] device team0 entered promiscuous mode [ 1184.476576] device team_slave_0 entered promiscuous mode [ 1184.498616] device team_slave_1 entered promiscuous mode [ 1184.561675] bond0: Enslaving team0 as an active interface with an up link [ 1184.601954] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1184.690800] bond0: Releasing backup interface team0 19:53:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001a000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1185.256519] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1185.268072] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1185.280479] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1185.297005] bond0: Releasing backup interface team0 19:53:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090020000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1185.313186] device team0 left promiscuous mode [ 1185.352807] device team_slave_0 left promiscuous mode 19:53:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000007ba8000001201", 0x2e}], 0x1}, 0x0) [ 1185.401801] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1185.469607] bond0: Releasing backup interface team0 19:53:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d0a0000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1185.512956] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 1186.269526] 8021q: adding VLAN 0 to HW filter on device team0 [ 1186.288025] bond0: Enslaving team0 as an active interface with an up link [ 1186.578909] bond0: Releasing backup interface team0 [ 1187.129990] bridge0: port 3(team0) entered blocking state [ 1187.146124] bridge0: port 3(team0) entered disabled state [ 1187.203138] device team0 entered promiscuous mode [ 1187.203148] device team_slave_0 entered promiscuous mode [ 1187.203275] device team_slave_1 entered promiscuous mode 19:53:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090e0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1187.982687] 8021q: adding VLAN 0 to HW filter on device team0 [ 1188.056799] bond0: Enslaving team0 as an active interface with an up link [ 1188.063986] validate_nla: 2 callbacks suppressed [ 1188.063996] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1188.129017] bond0: Releasing backup interface team0 [ 1188.723815] bridge0: port 1(team0) entered blocking state [ 1188.729562] bridge0: port 1(team0) entered disabled state [ 1188.748680] device team0 entered promiscuous mode [ 1188.776748] device team_slave_0 entered promiscuous mode [ 1188.792948] device team_slave_1 entered promiscuous mode [ 1188.801899] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 19:53:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009020e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1188.842037] 8021q: adding VLAN 0 to HW filter on device team0 [ 1188.872393] bond0: Enslaving team0 as an active interface with an up link [ 1188.928523] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1188.938966] bond0: Releasing backup interface team0 [ 1189.588783] bridge0: port 3(team0) entered blocking state [ 1189.594584] bridge0: port 3(team0) entered disabled state [ 1189.612214] device team0 entered promiscuous mode [ 1189.640173] device team_slave_0 entered promiscuous mode [ 1189.675371] device team_slave_1 entered promiscuous mode [ 1189.695431] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1189.709463] 8021q: adding VLAN 0 to HW filter on device team0 19:53:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001a000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1189.779348] device team0 entered promiscuous mode [ 1189.810769] device team_slave_0 entered promiscuous mode [ 1189.857643] bond0: Enslaving team0 as an active interface with an up link [ 1189.881089] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 1190.473774] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1190.515372] bond0: Releasing backup interface team0 [ 1190.535580] device team0 left promiscuous mode [ 1190.540282] device team_slave_0 left promiscuous mode 19:53:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d00000aba8000001201", 0x2e}], 0x1}, 0x0) [ 1190.630484] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 19:53:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090020000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1190.701767] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1190.714864] 8021q: adding VLAN 0 to HW filter on device team0 [ 1190.736493] bond0: Enslaving team0 as an active interface with an up link [ 1190.754856] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1190.799938] bond0: Releasing backup interface team0 19:53:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d0a0000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1191.521118] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 1191.528933] device team0 left promiscuous mode [ 1191.535109] device team_slave_0 left promiscuous mode [ 1191.552372] device team_slave_1 left promiscuous mode [ 1191.558170] bridge0: port 3(team0) entered disabled state [ 1191.614872] 8021q: adding VLAN 0 to HW filter on device team0 [ 1191.622390] bond0: Enslaving team0 as an active interface with an up link [ 1191.645649] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 1191.665544] bond0: Releasing backup interface team0 [ 1192.251675] bridge0: port 3(team0) entered blocking state [ 1192.257565] bridge0: port 3(team0) entered disabled state [ 1192.278825] device team0 entered promiscuous mode [ 1192.298340] device team_slave_0 entered promiscuous mode 19:53:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4400090e0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1192.339369] device team_slave_1 entered promiscuous mode [ 1192.349408] device team0 left promiscuous mode [ 1192.355017] device team_slave_0 left promiscuous mode [ 1192.361272] device team_slave_1 left promiscuous mode [ 1192.377765] bridge0: port 1(team0) entered disabled state [ 1192.431146] 8021q: adding VLAN 0 to HW filter on device team0 [ 1192.438616] bond0: Enslaving team0 as an active interface with an up link [ 1192.479050] bond0: Releasing backup interface team0 [ 1193.141114] bridge0: port 1(team0) entered blocking state [ 1193.157559] bridge0: port 1(team0) entered disabled state [ 1193.174886] device team0 entered promiscuous mode [ 1193.179902] device team_slave_0 entered promiscuous mode [ 1193.195787] device team_slave_1 entered promiscuous mode 19:53:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009020e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1193.247240] validate_nla: 2 callbacks suppressed [ 1193.247250] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1193.260664] device team0 left promiscuous mode [ 1193.265418] device team_slave_0 left promiscuous mode [ 1193.281669] device team_slave_1 left promiscuous mode [ 1193.297212] bridge0: port 3(team0) entered disabled state [ 1193.342283] 8021q: adding VLAN 0 to HW filter on device team0 [ 1193.349849] bond0: Enslaving team0 as an active interface with an up link [ 1193.376682] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1193.397075] bond0: Releasing backup interface team0 [ 1193.983182] bridge0: port 3(team0) entered blocking state [ 1193.999386] bridge0: port 3(team0) entered disabled state [ 1194.021495] device team0 entered promiscuous mode [ 1194.050665] device team_slave_0 entered promiscuous mode [ 1194.056384] device team_slave_1 entered promiscuous mode [ 1194.074674] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:53:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001a000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1194.100658] 8021q: adding VLAN 0 to HW filter on device team0 [ 1194.114858] device team0 entered promiscuous mode [ 1194.160688] device team_slave_0 entered promiscuous mode [ 1194.183497] bond0: Enslaving team0 as an active interface with an up link [ 1194.201515] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1194.222370] bond0: Releasing backup interface team0 [ 1194.265765] device team0 left promiscuous mode [ 1194.270756] device team_slave_0 left promiscuous mode [ 1194.294181] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 19:53:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d00000cba8000001201", 0x2e}], 0x1}, 0x0) [ 1194.310336] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 19:53:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000f000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1194.371080] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1194.382055] 8021q: adding VLAN 0 to HW filter on device team0 [ 1194.403436] bond0: Enslaving team0 as an active interface with an up link [ 1194.424497] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1194.493037] bond0: Releasing backup interface team0 19:53:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001f000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1195.035940] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 1195.046207] device team0 left promiscuous mode [ 1195.106337] device team_slave_0 left promiscuous mode [ 1195.122721] device team_slave_1 left promiscuous mode [ 1195.128437] bridge0: port 3(team0) entered disabled state [ 1195.185468] 8021q: adding VLAN 0 to HW filter on device team0 [ 1195.197761] bond0: Enslaving team0 as an active interface with an up link [ 1195.204948] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 1195.223484] bond0: Releasing backup interface team0 [ 1195.849221] bridge0: port 3(team0) entered blocking state [ 1195.893992] bridge0: port 3(team0) entered disabled state [ 1195.930035] device team0 entered promiscuous mode [ 1195.934915] device team_slave_0 entered promiscuous mode [ 1195.956808] device team_slave_1 entered promiscuous mode 19:53:28 executing program 4: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0x0) [ 1196.010074] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1196.020191] device team0 left promiscuous mode [ 1196.045933] device team_slave_0 left promiscuous mode [ 1196.052203] device team_slave_1 left promiscuous mode [ 1196.070513] bridge0: port 1(team0) entered disabled state [ 1196.142970] 8021q: adding VLAN 0 to HW filter on device team0 [ 1196.207443] bond0: Enslaving team0 as an active interface with an up link [ 1196.241154] bond0: Releasing backup interface team0 [ 1196.848082] bridge0: port 1(team0) entered blocking state [ 1196.869137] bridge0: port 1(team0) entered disabled state [ 1196.922362] device team0 entered promiscuous mode [ 1196.927394] device team_slave_0 entered promiscuous mode [ 1196.937981] device team_slave_1 entered promiscuous mode [ 1196.961450] device team0 left promiscuous mode [ 1196.966240] device team_slave_0 left promiscuous mode 19:53:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1196.991436] device team_slave_1 left promiscuous mode [ 1197.062999] bridge0: port 3(team0) entered disabled state [ 1197.124603] 8021q: adding VLAN 0 to HW filter on device team0 [ 1197.131878] bond0: Enslaving team0 as an active interface with an up link [ 1197.159824] bond0: Releasing backup interface team0 [ 1197.788320] bridge0: port 3(team0) entered blocking state [ 1197.808874] bridge0: port 3(team0) entered disabled state [ 1198.053489] device team0 entered promiscuous mode [ 1198.058411] device team_slave_0 entered promiscuous mode [ 1198.088989] device team_slave_1 entered promiscuous mode [ 1198.096732] 8021q: adding VLAN 0 to HW filter on device team0 [ 1198.146743] device team0 entered promiscuous mode [ 1198.151645] device team_slave_0 entered promiscuous mode [ 1198.170071] bond0: Enslaving team0 as an active interface with an up link [ 1198.188001] bond0: Releasing backup interface team0 [ 1198.198506] device team0 left promiscuous mode [ 1198.203147] device team_slave_0 left promiscuous mode 19:53:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb002009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1198.281454] validate_nla: 6 callbacks suppressed [ 1198.281464] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 19:53:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d00000eba8000001201", 0x2e}], 0x1}, 0x0) [ 1198.379791] bond0: Releasing backup interface team0 [ 1198.391968] device team0 left promiscuous mode [ 1198.422604] device team_slave_0 left promiscuous mode 19:53:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd25fb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1198.483751] device team_slave_1 left promiscuous mode [ 1198.500267] bridge0: port 3(team0) entered blocking state [ 1198.516289] bridge0: port 3(team0) entered disabled state [ 1198.523344] device team0 entered promiscuous mode 19:53:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000f000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1198.563362] device team_slave_0 entered promiscuous mode [ 1198.582576] device team_slave_1 entered promiscuous mode [ 1198.686065] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1198.696073] 8021q: adding VLAN 0 to HW filter on device team0 [ 1198.782966] bond0: Enslaving team0 as an active interface with an up link [ 1198.800489] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1198.820148] bond0: Releasing backup interface team0 19:53:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001f000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1199.376247] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1199.384434] device team0 left promiscuous mode [ 1199.389279] device team_slave_0 left promiscuous mode [ 1199.409918] device team_slave_1 left promiscuous mode [ 1199.431531] bridge0: port 1(team0) entered disabled state [ 1199.488246] 8021q: adding VLAN 0 to HW filter on device team0 [ 1199.496430] bond0: Enslaving team0 as an active interface with an up link [ 1199.513569] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1199.522056] device team0 entered promiscuous mode [ 1199.538812] device team_slave_0 entered promiscuous mode [ 1199.584621] device team_slave_1 entered promiscuous mode [ 1199.604038] bond0: Releasing backup interface team0 [ 1200.208715] bridge0: port 1(team0) entered blocking state [ 1200.241060] bridge0: port 1(team0) entered disabled state 19:53:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1200.265951] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1200.330967] device team0 left promiscuous mode [ 1200.345385] device team_slave_0 left promiscuous mode [ 1200.361666] device team_slave_1 left promiscuous mode [ 1200.403354] bridge0: port 3(team0) entered disabled state [ 1200.456062] 8021q: adding VLAN 0 to HW filter on device team0 [ 1200.463672] bond0: Enslaving team0 as an active interface with an up link [ 1200.512176] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1200.531621] bond0: Releasing backup interface team0 [ 1201.225747] bridge0: port 3(team0) entered blocking state [ 1201.231508] bridge0: port 3(team0) entered disabled state [ 1201.250892] device team0 entered promiscuous mode [ 1201.272176] device team_slave_0 entered promiscuous mode [ 1201.277909] device team_slave_1 entered promiscuous mode [ 1201.331136] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1201.340928] 8021q: adding VLAN 0 to HW filter on device team0 19:53:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb002009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1201.371782] device team0 entered promiscuous mode [ 1201.381785] device team_slave_0 entered promiscuous mode [ 1201.436660] bond0: Enslaving team0 as an active interface with an up link [ 1201.455774] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1201.485217] bond0: Releasing backup interface team0 [ 1201.490896] device team0 left promiscuous mode [ 1201.506930] device team_slave_0 left promiscuous mode 19:53:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000018ba8000001201", 0x2e}], 0x1}, 0x0) [ 1201.539493] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1201.555709] device team0 left promiscuous mode [ 1201.560806] device team_slave_0 left promiscuous mode [ 1201.582023] device team_slave_1 left promiscuous mode [ 1201.592973] bridge0: port 3(team0) entered disabled state [ 1201.660553] 8021q: adding VLAN 0 to HW filter on device team0 [ 1201.681115] bond0: Enslaving team0 as an active interface with an up link [ 1201.690328] bond0: Releasing backup interface team0 [ 1202.277339] bridge0: port 3(team0) entered blocking state [ 1202.283051] bridge0: port 3(team0) entered disabled state [ 1202.301087] device team0 entered promiscuous mode [ 1202.341858] device team_slave_0 entered promiscuous mode [ 1202.362467] device team_slave_1 entered promiscuous mode [ 1202.371211] device team0 left promiscuous mode [ 1202.375888] device team_slave_0 left promiscuous mode [ 1202.401777] device team_slave_1 left promiscuous mode 19:53:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd25fb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1202.468832] bridge0: port 3(team0) entered disabled state [ 1202.502493] 8021q: adding VLAN 0 to HW filter on device team0 [ 1202.563092] device team0 entered promiscuous mode [ 1202.568109] device team_slave_0 entered promiscuous mode [ 1202.586845] device team_slave_1 entered promiscuous mode [ 1202.593467] bond0: Enslaving team0 as an active interface with an up link [ 1202.651999] bond0: Releasing backup interface team0 [ 1202.658592] device team0 left promiscuous mode [ 1202.677762] device team_slave_0 left promiscuous mode [ 1202.684059] device team_slave_1 left promiscuous mode [ 1203.311772] bridge0: port 3(team0) entered blocking state [ 1203.317575] bridge0: port 3(team0) entered disabled state [ 1203.334056] device team0 entered promiscuous mode [ 1203.349430] device team_slave_0 entered promiscuous mode 19:53:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44000f000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1203.382939] device team_slave_1 entered promiscuous mode [ 1203.527791] validate_nla: 4 callbacks suppressed [ 1203.527803] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1203.577842] 8021q: adding VLAN 0 to HW filter on device team0 [ 1203.618164] bond0: Enslaving team0 as an active interface with an up link [ 1203.625342] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1203.675341] bond0: Releasing backup interface team0 [ 1203.987996] bridge0: received packet on veth1_to_bond with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) 19:53:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44001f000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1204.319532] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1204.332804] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1204.340520] device team0 left promiscuous mode [ 1204.359199] device team_slave_0 left promiscuous mode [ 1204.399515] device team_slave_1 left promiscuous mode [ 1204.405165] bridge0: port 3(team0) entered disabled state [ 1204.426525] 8021q: adding VLAN 0 to HW filter on device team0 [ 1204.456700] bond0: Enslaving team0 as an active interface with an up link 19:53:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb002009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1204.498740] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1204.507917] 8021q: adding VLAN 0 to HW filter on device team0 [ 1204.521879] device team0 entered promiscuous mode [ 1204.553322] device team_slave_0 entered promiscuous mode [ 1204.607884] bond0: Enslaving team0 as an active interface with an up link [ 1204.646440] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1204.665672] bond0: Releasing backup interface team0 [ 1204.707902] device team0 left promiscuous mode [ 1204.712672] device team_slave_0 left promiscuous mode [ 1204.741494] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 1204.752818] device team0 left promiscuous mode [ 1204.767433] device team_slave_0 left promiscuous mode 19:53:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d00001fba8000001201", 0x2e}], 0x1}, 0x0) [ 1204.811171] device team_slave_1 left promiscuous mode [ 1204.820120] bridge0: port 3(team0) entered disabled state [ 1204.870719] 8021q: adding VLAN 0 to HW filter on device team0 [ 1204.911740] bond0: Enslaving team0 as an active interface with an up link [ 1204.929482] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 1204.940704] bond0: Releasing backup interface team0 [ 1205.565760] bridge0: port 3(team0) entered blocking state [ 1205.587858] bridge0: port 3(team0) entered disabled state [ 1205.644834] device team0 entered promiscuous mode [ 1205.666279] device team_slave_0 entered promiscuous mode [ 1205.672075] device team_slave_1 entered promiscuous mode [ 1205.696056] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 19:53:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd25fb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1205.777530] device team0 left promiscuous mode [ 1205.785817] device team_slave_0 left promiscuous mode [ 1205.830879] device team_slave_1 left promiscuous mode [ 1205.837113] bridge0: port 3(team0) entered disabled state [ 1205.878698] 8021q: adding VLAN 0 to HW filter on device team0 [ 1205.889409] device team0 entered promiscuous mode [ 1205.894402] device team_slave_0 entered promiscuous mode [ 1205.930513] device team_slave_1 entered promiscuous mode [ 1205.948834] bond0: Enslaving team0 as an active interface with an up link [ 1205.967757] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 1205.994112] bond0: Releasing backup interface team0 [ 1206.038340] device team0 left promiscuous mode [ 1206.043169] device team_slave_0 left promiscuous mode [ 1206.048684] device team_slave_1 left promiscuous mode [ 1206.660873] bridge0: port 3(team0) entered blocking state [ 1206.679681] bridge0: port 3(team0) entered disabled state [ 1206.701106] device team0 entered promiscuous mode [ 1206.706124] device team_slave_0 entered promiscuous mode 19:53:39 executing program 3: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f9", 0xb2, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1206.748468] device team_slave_1 entered promiscuous mode [ 1206.858874] 8021q: adding VLAN 0 to HW filter on device team0 [ 1206.899974] bond0: Enslaving team0 as an active interface with an up link [ 1207.466318] bond0: Releasing backup interface team0 19:53:40 executing program 3: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1208.205551] device team0 left promiscuous mode [ 1208.210262] device team_slave_0 left promiscuous mode [ 1208.237932] device team_slave_1 left promiscuous mode [ 1208.244819] bridge0: port 1(team0) entered disabled state 19:53:41 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1208.347513] 8021q: adding VLAN 0 to HW filter on device team0 [ 1208.355007] bond0: Enslaving team0 as an active interface with an up link [ 1208.409240] device team0 entered promiscuous mode [ 1208.414212] device team_slave_0 entered promiscuous mode [ 1208.423798] device team_slave_1 entered promiscuous mode [ 1208.522918] bond0: Releasing backup interface team0 19:53:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef425000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:41 executing program 3: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1209.309417] bridge0: port 1(team0) entered blocking state [ 1209.318423] bridge0: port 1(team0) entered disabled state 19:53:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1209.354480] validate_nla: 4 callbacks suppressed [ 1209.354490] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 19:53:42 executing program 3: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1210.341104] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1210.365496] bond0: Releasing backup interface team0 [ 1210.389630] bridge0: port 3(team0) entered blocking state [ 1210.395226] bridge0: port 3(team0) entered disabled state 19:53:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188042546ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1210.457993] device team0 entered promiscuous mode [ 1210.482998] device team_slave_0 entered promiscuous mode [ 1210.500416] device team_slave_1 entered promiscuous mode 19:53:43 executing program 5: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1210.531740] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1210.547254] 8021q: adding VLAN 0 to HW filter on device team0 [ 1210.569263] device team0 entered promiscuous mode [ 1210.584535] device team_slave_0 entered promiscuous mode [ 1210.591507] bond0: Enslaving team0 as an active interface with an up link [ 1211.370064] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1211.408784] bond0: Releasing backup interface team0 [ 1211.429882] device team0 left promiscuous mode [ 1211.460277] device team_slave_0 left promiscuous mode [ 1211.484384] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 1211.497055] device team0 left promiscuous mode [ 1211.505185] device team_slave_0 left promiscuous mode [ 1211.526334] device team_slave_1 left promiscuous mode [ 1211.583987] bridge0: port 3(team0) entered disabled state 19:53:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d006558ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040d46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1211.726568] 8021q: adding VLAN 0 to HW filter on device team0 [ 1211.796011] bond0: Enslaving team0 as an active interface with an up link [ 1211.826312] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 1211.880864] bond0: Releasing backup interface team0 [ 1212.806393] bridge0: port 3(team0) entered blocking state [ 1212.817376] bridge0: port 3(team0) entered disabled state [ 1212.834532] device team0 entered promiscuous mode [ 1212.854202] device team_slave_0 entered promiscuous mode [ 1212.860762] device team_slave_1 entered promiscuous mode 19:53:45 executing program 4: prlimit64(0x0, 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$key(0xf, 0x3, 0x2) dup2(r2, r3) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000000)={0x0, 0x1, 0x2, 0x1, 0xd, "d3bd471b4e4a05ef"}) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) [ 1212.950814] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1212.965496] 8021q: adding VLAN 0 to HW filter on device team0 [ 1213.067432] bond0: Enslaving team0 as an active interface with an up link [ 1213.613836] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1213.626467] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1213.645644] device team0 left promiscuous mode [ 1213.739773] device team_slave_0 left promiscuous mode [ 1213.762679] device team_slave_1 left promiscuous mode 19:53:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef425000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1213.938465] bridge0: port 1(team0) entered disabled state [ 1213.953018] 8021q: adding VLAN 0 to HW filter on device team0 [ 1214.020178] bond0: Enslaving team0 as an active interface with an up link [ 1214.027169] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1214.038419] bridge0: port 1(bond0) entered blocking state [ 1214.044037] bridge0: port 1(bond0) entered disabled state [ 1214.082499] device bond0 entered promiscuous mode [ 1214.136810] device bond_slave_0 entered promiscuous mode [ 1214.170362] device bond_slave_1 entered promiscuous mode 19:53:47 executing program 4: prlimit64(0x0, 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$key(0xf, 0x3, 0x2) dup2(r2, r3) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000000)={0x0, 0x1, 0x2, 0x1, 0xd, "d3bd471b4e4a05ef"}) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) [ 1214.237857] device team0 entered promiscuous mode [ 1214.283138] device team_slave_0 entered promiscuous mode [ 1214.336288] device team_slave_1 entered promiscuous mode [ 1214.382041] bridge0: port 1(bond0) entered blocking state [ 1214.387727] bridge0: port 1(bond0) entered forwarding state [ 1214.474029] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 1214.501335] device team0 left promiscuous mode 19:53:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1214.584937] device team_slave_0 left promiscuous mode [ 1214.585106] device team_slave_1 left promiscuous mode [ 1214.585356] bridge0: port 3(team0) entered disabled state [ 1214.597957] 8021q: adding VLAN 0 to HW filter on device team0 [ 1214.604090] device team0 entered promiscuous mode [ 1214.604102] device team_slave_0 entered promiscuous mode [ 1214.652685] device team_slave_1 entered promiscuous mode [ 1214.653385] bond0: Enslaving team0 as an active interface with an up link [ 1214.653432] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 1214.654772] bond0: Releasing backup interface team0 [ 1214.655337] device team0 left promiscuous mode [ 1214.655347] device team_slave_0 left promiscuous mode [ 1214.655489] device team_slave_1 left promiscuous mode 19:53:48 executing program 4: prlimit64(0x0, 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$key(0xf, 0x3, 0x2) dup2(r2, r3) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000000)={0x0, 0x1, 0x2, 0x1, 0xd, "d3bd471b4e4a05ef"}) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) [ 1215.982635] bridge0: port 3(team0) entered blocking state [ 1216.003648] bridge0: port 3(team0) entered disabled state [ 1216.012036] device team0 entered promiscuous mode [ 1216.028219] device team_slave_0 entered promiscuous mode [ 1216.034125] device team_slave_1 entered promiscuous mode 19:53:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188042546ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1216.135797] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:53:49 executing program 4: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1216.216812] 8021q: adding VLAN 0 to HW filter on device team0 [ 1216.268373] device team0 entered promiscuous mode [ 1216.273252] device team_slave_0 entered promiscuous mode [ 1216.279456] bond0: Enslaving team0 as an active interface with an up link [ 1216.286448] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1216.334848] bond0: Releasing backup interface team0 [ 1216.340355] device team0 left promiscuous mode [ 1216.897301] device team_slave_0 left promiscuous mode 19:53:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000060ba8000001201", 0x2e}], 0x1}, 0x0) [ 1216.935800] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1216.954937] device team0 left promiscuous mode [ 1217.049177] device team_slave_0 left promiscuous mode 19:53:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d005865ba8000001201", 0x2e}], 0x1}, 0x0) [ 1217.106734] device team_slave_1 left promiscuous mode [ 1217.151462] bridge0: port 3(team0) entered disabled state [ 1217.214850] 8021q: adding VLAN 0 to HW filter on device team0 [ 1217.229765] bond0: Enslaving team0 as an active interface with an up link 19:53:50 executing program 4: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1217.264650] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1217.365201] bond0: Releasing backup interface team0 [ 1218.067052] bridge0: port 3(team0) entered blocking state [ 1218.109920] bridge0: port 3(team0) entered disabled state [ 1218.134378] device team0 entered promiscuous mode [ 1218.141102] device team_slave_0 entered promiscuous mode [ 1218.159020] device team_slave_1 entered promiscuous mode 19:53:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040d46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:51 executing program 4: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1218.433858] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 19:53:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef425000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1219.318481] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1219.365000] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 19:53:52 executing program 4: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:53:53 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x180}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) write(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sched_setattr(r3, &(0x7f0000000080)={0x38, 0x0, 0x40, 0x2, 0x80, 0x6, 0x8, 0x9eac, 0x30, 0x7}, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r2, r1, &(0x7f0000000040)=0x100060, 0xa808) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) [ 1220.334486] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1220.413873] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 19:53:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1220.463473] device team0 left promiscuous mode [ 1220.527441] device team_slave_0 left promiscuous mode 19:53:54 executing program 1: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1221.109384] device team_slave_1 left promiscuous mode [ 1221.148159] bridge0: port 3(team0) entered disabled state [ 1221.255151] 8021q: adding VLAN 0 to HW filter on device team0 [ 1223.683819] device team0 entered promiscuous mode [ 1223.683831] device team_slave_0 entered promiscuous mode [ 1223.683969] device team_slave_1 entered promiscuous mode [ 1223.697509] bond0: Enslaving team0 as an active interface with an up link [ 1223.697554] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 1223.698787] bond0: Releasing backup interface team0 [ 1223.699638] device team0 left promiscuous mode [ 1223.699647] device team_slave_0 left promiscuous mode [ 1223.699775] device team_slave_1 left promiscuous mode [ 1224.564925] bridge0: port 3(team0) entered blocking state [ 1224.564962] bridge0: port 3(team0) entered disabled state 19:53:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188042546ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:53:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000081ba8000001201", 0x2e}], 0x1}, 0x0) [ 1224.566282] device team0 entered promiscuous mode [ 1224.566292] device team_slave_0 entered promiscuous mode [ 1224.566428] device team_slave_1 entered promiscuous mode [ 1224.569744] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1224.571276] 8021q: adding VLAN 0 to HW filter on device team0 [ 1224.572175] device team0 entered promiscuous mode [ 1224.572184] device team_slave_0 entered promiscuous mode [ 1224.572813] bond0: Enslaving team0 as an active interface with an up link [ 1224.607118] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1224.608727] bond0: Releasing backup interface team0 [ 1224.621654] device team0 left promiscuous mode [ 1224.621674] device team_slave_0 left promiscuous mode [ 1224.627359] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1224.627512] device team0 left promiscuous mode [ 1224.627522] device team_slave_0 left promiscuous mode [ 1224.627661] device team_slave_1 left promiscuous mode [ 1224.627906] bridge0: port 3(team0) entered disabled state [ 1224.634656] 8021q: adding VLAN 0 to HW filter on device team0 [ 1224.635932] bond0: Enslaving team0 as an active interface with an up link [ 1224.635986] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1224.676130] bond0: Releasing backup interface team0 19:53:58 executing program 1: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) 19:54:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040d46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 19:54:01 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1225.763806] bridge0: port 3(team0) entered blocking state [ 1225.763844] bridge0: port 3(team0) entered disabled state [ 1228.100765] device team0 entered promiscuous mode [ 1228.100778] device team_slave_0 entered promiscuous mode [ 1228.100934] device team_slave_1 entered promiscuous mode [ 1228.113544] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1228.114249] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1230.448105] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 1230.448292] device team0 left promiscuous mode [ 1230.448302] device team_slave_0 left promiscuous mode [ 1230.448454] device team_slave_1 left promiscuous mode 19:54:03 executing program 2: prlimit64(0x0, 0x3, &(0x7f0000000280)={0x9, 0x8c}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x40, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x400, 0x0, 0x0, 0x3, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xf) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x5}, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) write(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "75f1f1f2ff5ea649636f38aa83a31e36c5eef049c0b7381a1a0df80bcdab017d96189f419995bdbf1f71a4505c5ec2aec17a4af3183861a41265810000000525ee13765822d60308da1666b14d2ca3b3"}, 0x112) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0", 0xbd, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x406f408, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x100060, 0xa808) [ 1230.448710] bridge0: port 3(team0) entered disabled state [ 1230.451416] 8021q: adding VLAN 0 to HW filter on device team0 [ 1230.452253] device team0 entered promiscuous mode [ 1230.452263] device team_slave_0 entered promiscuous mode [ 1230.452400] device team_slave_1 entered promiscuous mode [ 1230.452832] bond0: Enslaving team0 as an active interface with an up link [ 1230.452883] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 1230.453878] bond0: Releasing backup interface team0 [ 1230.454168] device team0 left promiscuous mode [ 1230.454177] device team_slave_0 left promiscuous mode [ 1230.454307] device team_slave_1 left promiscuous mode [ 1245.216800] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:1e, vlan:0) [ 1245.260433] bridge0: received packet on veth1_to_bond with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1245.289323] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1245.438165] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:1e, vlan:0) [ 1245.486843] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1245.647043] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:1e, vlan:0) [ 1245.747346] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1245.890354] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:1e, vlan:0) [ 1245.933984] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1246.089136] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:1e, vlan:0) [ 1250.247100] net_ratelimit: 42 callbacks suppressed [ 1250.247190] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1250.407043] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:1e, vlan:0) [ 1250.438584] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1250.552823] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:1e, vlan:0) [ 1250.577053] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1250.660361] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:1e, vlan:0) [ 1250.688666] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1250.689743] ieee802154 phy0 wpan0: encryption failed: -22 [ 1250.700616] ieee802154 phy1 wpan1: encryption failed: -22 [ 1250.781873] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:1e, vlan:0) [ 1250.821936] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1250.959375] bridge0: received packet on bond0 with own address as source address (addr:aa:aa:aa:aa:aa:1e, vlan:0) [ 1251.024536] watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor.4:25554] [ 1251.024543] Modules linked in: [ 1251.024550] irq event stamp: 3783463 [ 1251.024568] hardirqs last enabled at (3783462): [] trace_hardirqs_on_thunk+0x1a/0x1c [ 1251.024582] hardirqs last disabled at (3783463): [] trace_hardirqs_off_thunk+0x1a/0x1c [ 1251.024596] softirqs last enabled at (3765656): [] __do_softirq+0x678/0x980 [ 1251.024609] softirqs last disabled at (3765659): [] irq_exit+0x215/0x260 [ 1251.024622] CPU: 0 PID: 25554 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1251.024629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1251.024644] RIP: 0010:lock_acquire+0x1ec/0x3c0 [ 1251.024659] Code: 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 b7 01 00 00 48 83 3d 09 2e a6 08 00 0f 84 2a 01 00 00 48 8b 7c 24 08 57 9d <0f> 1f 44 00 00 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 65 8b [ 1251.024666] RSP: 0018:ffff8880ba006ee0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 1251.024678] RAX: 1ffffffff13e3051 RBX: ffff8880ab294200 RCX: e849679332d84bd5 [ 1251.024686] RDX: dffffc0000000000 RSI: 0000000018c72b4c RDI: 0000000000000286 [ 1251.024693] RBP: ffffffff89f85fa0 R08: 0000000033cf6708 R09: 0000000000000005 [ 1251.024701] R10: ffff8880ab294b50 R11: 0000000000074071 R12: 0000000000000000 [ 1251.024708] R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000000000 [ 1251.024718] FS: 00007f1a95065700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1251.024725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1251.024733] CR2: 00007f4fb7120f64 CR3: 0000000009e6d000 CR4: 00000000003406f0 [ 1251.024744] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1251.024752] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1251.024756] Call Trace: [ 1251.024761] [ 1251.024780] is_bpf_text_address+0x36/0x1b0 [ 1251.024792] ? __bpf_address_lookup+0x330/0x330 [ 1251.024807] kernel_text_address+0xbd/0xf0 [ 1251.024822] __kernel_text_address+0x9/0x30 [ 1251.024836] unwind_get_return_address+0x51/0x90 [ 1251.024851] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.024862] __save_stack_trace+0xaf/0x190 [ 1251.024887] kasan_kmalloc+0xeb/0x160 [ 1251.024902] ? kmem_cache_alloc_trace+0x11a/0x380 [ 1251.024915] ? br_nf_forward_ip+0x34d/0x15e0 [ 1251.024927] ? nf_hook_slow+0xc5/0x1e0 [ 1251.024938] ? __br_forward+0x354/0xae0 [ 1251.024947] ? maybe_deliver+0x292/0x380 [ 1251.024957] ? br_flood+0x158/0x4d0 [ 1251.024968] ? br_handle_frame_finish+0xf41/0x1410 [ 1251.024980] ? br_nf_hook_thresh+0x2a3/0x330 [ 1251.024993] ? br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 [ 1251.025006] ? br_nf_pre_routing_ipv6+0x3f4/0x860 [ 1251.025018] ? br_nf_pre_routing+0xf05/0x1500 [ 1251.025029] ? nf_hook_slow+0xc5/0x1e0 [ 1251.025040] ? br_handle_frame+0xa60/0x13b0 [ 1251.025053] ? __netif_receive_skb_core+0x929/0x3270 [ 1251.025065] ? __netif_receive_skb_one_core+0xae/0x180 [ 1251.025076] ? __netif_receive_skb+0x27/0x1c0 [ 1251.025087] ? process_backlog+0x241/0x700 [ 1251.025098] ? net_rx_action+0x4ac/0xfb0 [ 1251.025108] ? __do_softirq+0x265/0x980 [ 1251.025119] ? irq_exit+0x215/0x260 [ 1251.025130] ? smp_apic_timer_interrupt+0x136/0x550 [ 1251.025142] ? apic_timer_interrupt+0xf/0x20 [ 1251.025153] ? PageHuge+0x21/0x160 [ 1251.025165] ? page_remove_file_rmap+0x3e/0xa30 [ 1251.025176] ? page_remove_rmap+0xe5/0x120 [ 1251.025188] ? unmap_page_range+0x147d/0x2c50 [ 1251.025200] ? unmap_single_vma+0x198/0x300 [ 1251.025211] ? unmap_vmas+0xa9/0x180 [ 1251.025221] ? exit_mmap+0x2b9/0x530 [ 1251.025232] ? mmput+0x14e/0x4a0 [ 1251.025242] ? do_exit+0xaec/0x2be0 [ 1251.025253] ? do_group_exit+0x125/0x310 [ 1251.025264] ? get_signal+0x3f2/0x1f70 [ 1251.025276] ? do_signal+0x8f/0x1670 [ 1251.025287] ? exit_to_usermode_loop+0x204/0x2a0 [ 1251.025298] ? do_syscall_64+0x538/0x620 [ 1251.025312] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.025324] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1251.025339] ? rcu_nmi_exit+0xb3/0x180 [ 1251.025353] ? retint_kernel+0x2d/0x2d [ 1251.025378] kmem_cache_alloc_trace+0x11a/0x380 [ 1251.025395] br_nf_forward_ip+0x34d/0x15e0 [ 1251.025411] ? br_nf_forward_arp+0xc90/0xc90 [ 1251.025425] ? rcu_nmi_exit+0xb3/0x180 [ 1251.025446] ? retint_kernel+0x2d/0x2d [ 1251.025466] nf_hook_slow+0xc5/0x1e0 [ 1251.025481] __br_forward+0x354/0xae0 [ 1251.025494] ? br_forward_finish+0x3d0/0x3d0 [ 1251.025504] ? skb_clone+0x151/0x3d0 [ 1251.025519] ? br_dev_queue_push_xmit+0x6c0/0x6c0 [ 1251.025530] ? kmem_cache_alloc+0x315/0x370 [ 1251.025548] maybe_deliver+0x292/0x380 [ 1251.025563] br_flood+0x158/0x4d0 [ 1251.025584] br_handle_frame_finish+0xf41/0x1410 [ 1251.025599] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.025619] ? check_preemption_disabled+0x41/0x280 [ 1251.025633] ? nf_hook_slow+0xf5/0x1e0 [ 1251.025651] br_nf_hook_thresh+0x2a3/0x330 [ 1251.025664] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.025680] ? setup_pre_routing+0x450/0x450 [ 1251.025695] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.025709] ? nf_bridge_update_protocol+0x6e/0x120 [ 1251.025723] ? nf_bridge_encap_header_len+0xb/0x80 [ 1251.025741] br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 [ 1251.025752] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.025766] ? check_preemption_disabled+0x41/0x280 [ 1251.025785] br_nf_pre_routing_ipv6+0x3f4/0x860 [ 1251.025800] ? br_validate_ipv6+0xb80/0xb80 [ 1251.025815] ? __sanitizer_cov_trace_pc+0x4/0x50 [ 1251.025831] ? br_nf_pre_routing+0x1500/0x1500 [ 1251.025845] ? check_preemption_disabled+0x41/0x280 [ 1251.025866] br_nf_pre_routing+0xf05/0x1500 [ 1251.025883] ? br_nf_pre_routing_finish+0x17c0/0x17c0 [ 1251.025899] ? broute_net_init+0x30/0x30 [ 1251.025911] ? ebt_broute+0xd0/0x190 [ 1251.025932] nf_hook_slow+0xc5/0x1e0 [ 1251.025947] br_handle_frame+0xa60/0x13b0 [ 1251.025961] ? kmem_cache_free+0x226/0x260 [ 1251.025974] ? br_handle_local_finish+0x20/0x20 [ 1251.025990] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.026006] ? br_handle_local_finish+0x20/0x20 [ 1251.026021] __netif_receive_skb_core+0x929/0x3270 [ 1251.026041] ? do_xdp_generic.part.0+0x1a0/0x1a0 [ 1251.026055] ? ipv6_rcv+0xfa/0x3f0 [ 1251.026068] ? mark_held_locks+0xf0/0xf0 [ 1251.026081] ? retint_kernel+0x2d/0x2d [ 1251.026097] ? ip6_rcv_finish_core.constprop.0.isra.0+0x550/0x550 [ 1251.026112] ? __netif_receive_skb_core+0x17f6/0x3270 [ 1251.026130] __netif_receive_skb_one_core+0xae/0x180 [ 1251.026143] ? __netif_receive_skb_core+0x3270/0x3270 [ 1251.026160] ? lock_acquire+0x170/0x3c0 [ 1251.026173] ? process_backlog+0x1d0/0x700 [ 1251.026188] __netif_receive_skb+0x27/0x1c0 [ 1251.026202] process_backlog+0x241/0x700 [ 1251.026216] ? net_rx_action+0x260/0xfb0 [ 1251.026231] net_rx_action+0x4ac/0xfb0 [ 1251.026251] ? napi_complete_done+0x570/0x570 [ 1251.026267] ? check_preemption_disabled+0x41/0x280 [ 1251.026286] __do_softirq+0x265/0x980 [ 1251.026307] irq_exit+0x215/0x260 [ 1251.026319] smp_apic_timer_interrupt+0x136/0x550 [ 1251.026335] apic_timer_interrupt+0xf/0x20 [ 1251.026341] [ 1251.026352] RIP: 0010:PageHuge+0x21/0x160 [ 1251.026365] Code: b5 42 04 00 e9 0b ff ff ff 41 54 55 53 48 89 fb e8 b4 65 ce ff 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 <0f> 85 13 01 00 00 48 8b 2b 31 ff 48 c1 ed 0f 83 e5 01 89 ee e8 b6 [ 1251.026372] RSP: 0018:ffff88805301f6e0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 1251.026384] RAX: dffffc0000000000 RBX: ffffea00023b4cc0 RCX: ffffffff819d5a57 [ 1251.026392] RDX: 1ffffd4000476998 RSI: ffffffff81941fbc RDI: ffffea00023b4cc0 [ 1251.026399] RBP: ffffea00023b4cc0 R08: 0000000000000000 R09: ffffed1016b3ede8 [ 1251.026406] R10: ffff8880b59f6f43 R11: 0000000000000000 R12: 0000000000000000 [ 1251.026414] R13: 0000000000000000 R14: ffffea00023b4cc0 R15: 00007f1a966d6000 [ 1251.026434] ? lock_page_memcg+0xa7/0x220 [ 1251.026450] ? PageHuge+0xc/0x160 [ 1251.026468] page_remove_file_rmap+0x3e/0xa30 [ 1251.026484] page_remove_rmap+0xe5/0x120 [ 1251.026499] unmap_page_range+0x147d/0x2c50 [ 1251.026530] ? vm_normal_page_pmd+0x4c0/0x4c0 [ 1251.026544] ? retint_kernel+0x2d/0x2d [ 1251.026556] ? uprobe_munmap+0x2d/0x4d0 [ 1251.026573] unmap_single_vma+0x198/0x300 [ 1251.026590] unmap_vmas+0xa9/0x180 [ 1251.026605] exit_mmap+0x2b9/0x530 [ 1251.026618] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1251.026630] ? rcu_nmi_exit+0xb3/0x180 [ 1251.026655] ? __khugepaged_exit+0x2a6/0x3e0 [ 1251.026667] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1251.026680] ? kmem_cache_free+0x226/0x260 [ 1251.026694] ? __khugepaged_exit+0x2c7/0x3e0 [ 1251.026709] mmput+0x14e/0x4a0 [ 1251.026723] do_exit+0xaec/0x2be0 [ 1251.026740] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1251.026752] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1251.026765] ? mm_update_next_owner+0x650/0x650 [ 1251.026777] ? rcu_nmi_exit+0xb3/0x180 [ 1251.026792] ? retint_kernel+0x2d/0x2d [ 1251.026812] do_group_exit+0x125/0x310 [ 1251.026827] get_signal+0x3f2/0x1f70 [ 1251.026839] ? retint_kernel+0x2d/0x2d [ 1251.026864] do_signal+0x8f/0x1670 [ 1251.026878] ? rcu_nmi_exit+0xb3/0x180 [ 1251.026894] ? setup_sigcontext+0x820/0x820 [ 1251.026910] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1251.026925] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1251.026938] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1251.026953] ? rcu_nmi_exit+0xb3/0x180 [ 1251.026967] ? retint_kernel+0x2d/0x2d [ 1251.026990] exit_to_usermode_loop+0x204/0x2a0 [ 1251.027005] do_syscall_64+0x538/0x620 [ 1251.027022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.027032] RIP: 0033:0x7f1a966f0049 [ 1251.027043] Code: Bad RIP value. [ 1251.027050] RSP: 002b:00007f1a95065168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1251.027061] RAX: 0000000000000800 RBX: 00007f1a96802f60 RCX: 00007f1a966f0049 [ 1251.027068] RDX: 0000000020000040 RSI: 0000000000000005 RDI: 0000000000000006 [ 1251.027075] RBP: 00007f1a9674a08d R08: 0000000000000000 R09: 0000000000000000 [ 1251.027082] R10: 000000000000a808 R11: 0000000000000246 R12: 0000000000000000 [ 1251.027090] R13: 00007ffcb5997ebf R14: 00007f1a95065300 R15: 0000000000022000 [ 1251.027111] Sending NMI from CPU 0 to CPUs 1: [ 1251.028422] NMI backtrace for cpu 1 [ 1251.028428] CPU: 1 PID: 3133 Comm: aoe_tx0 Not tainted 4.19.211-syzkaller #0 [ 1251.028434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1251.028437] RIP: 0010:preempt_count_add+0x20/0x190 [ 1251.028448] Code: f7 36 8d e8 b2 f3 56 00 eb ab 48 b8 00 00 00 00 00 fc ff df 55 89 fd 53 48 c7 c3 60 37 24 8d 48 89 da 48 c1 ea 03 0f b6 14 02 <48> 89 d8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 2a 01 00 00 8b [ 1251.028452] RSP: 0018:ffff8880ba1070a0 EFLAGS: 00000a02 [ 1251.028460] RAX: dffffc0000000000 RBX: ffffffff8d243760 RCX: 0000000000000018 [ 1251.028465] RDX: 0000000000000004 RSI: ffff8880ba107048 RDI: 0000000000000001 [ 1251.028470] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000001 [ 1251.028475] R10: ffff8880ba107247 R11: 0000000000074071 R12: ffff8880ba107230 [ 1251.028480] R13: 0000000000000000 R14: ffff8880ba1071e8 R15: 00000000000000e8 [ 1251.028486] FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1251.028491] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1251.028496] CR2: 00007ff511eee018 CR3: 00000000a5f79000 CR4: 00000000003406e0 [ 1251.028501] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1251.028506] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1251.028509] Call Trace: [ 1251.028511] [ 1251.028515] unwind_next_frame+0x135/0x1400 [ 1251.028518] ? kthread+0x33f/0x460 [ 1251.028522] ? deref_stack_reg+0x1d0/0x1d0 [ 1251.028525] ? __unwind_start+0x5b8/0x960 [ 1251.028529] ? br_fdb_offloaded_set+0x80/0x80 [ 1251.028533] ? unwind_next_frame+0x1400/0x1400 [ 1251.028536] ? nf_hook_slow+0xf5/0x1e0 [ 1251.028539] ? kthread+0x33f/0x460 [ 1251.028543] __save_stack_trace+0x9f/0x190 [ 1251.028546] ? kthread+0x33f/0x460 [ 1251.028549] kasan_kmalloc+0xeb/0x160 [ 1251.028553] ? kmem_cache_alloc+0x110/0x370 [ 1251.028556] ? skb_clone+0x151/0x3d0 [ 1251.028560] ? maybe_deliver+0x277/0x380 [ 1251.028563] ? br_flood+0x158/0x4d0 [ 1251.028567] ? br_handle_frame_finish+0xf41/0x1410 [ 1251.028570] ? br_nf_hook_thresh+0x2a3/0x330 [ 1251.028574] ? br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 [ 1251.028578] ? br_nf_pre_routing_ipv6+0x3f4/0x860 [ 1251.028582] ? br_nf_pre_routing+0xf05/0x1500 [ 1251.028585] ? nf_hook_slow+0xc5/0x1e0 [ 1251.028589] ? br_handle_frame+0xa60/0x13b0 [ 1251.028593] ? __netif_receive_skb_core+0x929/0x3270 [ 1251.028597] ? __netif_receive_skb_one_core+0xae/0x180 [ 1251.028601] ? __netif_receive_skb+0x27/0x1c0 [ 1251.028604] ? process_backlog+0x241/0x700 [ 1251.028607] ? net_rx_action+0x4ac/0xfb0 [ 1251.028611] ? __do_softirq+0x265/0x980 [ 1251.028614] ? do_softirq_own_stack+0x2a/0x40 [ 1251.028618] ? do_softirq.part.0+0x160/0x1c0 [ 1251.028622] ? __local_bh_enable_ip+0x20e/0x270 [ 1251.028625] ? __dev_queue_xmit+0x1628/0x2e00 [ 1251.028628] ? tx+0x68/0xb0 [ 1251.028632] ? kthread+0x1d9/0x390 [ 1251.028635] ? kthread+0x33f/0x460 [ 1251.028638] ? ret_from_fork+0x24/0x30 [ 1251.028641] ? __br_forward+0x38e/0xae0 [ 1251.028645] ? lock_downgrade+0x720/0x720 [ 1251.028649] ? should_fail+0x142/0x7b0 [ 1251.028652] ? setup_fault_attr+0x200/0x200 [ 1251.028655] ? __br_forward+0x3d5/0xae0 [ 1251.028659] ? kmem_cache_alloc+0x2b1/0x370 [ 1251.028663] kmem_cache_alloc+0x110/0x370 [ 1251.028666] skb_clone+0x151/0x3d0 [ 1251.028669] maybe_deliver+0x277/0x380 [ 1251.028672] br_flood+0x158/0x4d0 [ 1251.028676] br_handle_frame_finish+0xf41/0x1410 [ 1251.028680] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.028683] ? __local_bh_enable_ip+0x159/0x270 [ 1251.028687] ? check_preemption_disabled+0x41/0x280 [ 1251.028691] ? check_preemption_disabled+0x41/0x280 [ 1251.028695] ? nf_hook_slow+0xf5/0x1e0 [ 1251.028698] br_nf_hook_thresh+0x2a3/0x330 [ 1251.028702] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.028706] ? setup_pre_routing+0x450/0x450 [ 1251.028709] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.028713] ? check_preemption_disabled+0x41/0x280 [ 1251.028717] br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 [ 1251.028721] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.028725] ? check_preemption_disabled+0x41/0x280 [ 1251.028729] br_nf_pre_routing_ipv6+0x3f4/0x860 [ 1251.028732] ? br_validate_ipv6+0xb80/0xb80 [ 1251.028736] ? lockdep_hardirqs_on+0x288/0x5c0 [ 1251.028739] ? ebt_do_table+0x1924/0x1d50 [ 1251.028743] ? br_nf_pre_routing+0x1500/0x1500 [ 1251.028747] ? check_preemption_disabled+0x41/0x280 [ 1251.028750] br_nf_pre_routing+0xf05/0x1500 [ 1251.028755] ? br_nf_pre_routing_finish+0x17c0/0x17c0 [ 1251.028758] ? broute_net_init+0x30/0x30 [ 1251.028761] ? ebt_broute+0xd0/0x190 [ 1251.028765] nf_hook_slow+0xc5/0x1e0 [ 1251.028768] br_handle_frame+0xa60/0x13b0 [ 1251.028772] ? kmem_cache_free+0x226/0x260 [ 1251.028776] ? br_handle_local_finish+0x20/0x20 [ 1251.028779] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.028783] ? br_handle_local_finish+0x20/0x20 [ 1251.028787] __netif_receive_skb_core+0x929/0x3270 [ 1251.028790] ? do_xdp_generic.part.0+0x1a0/0x1a0 [ 1251.028794] ? ipv6_rcv+0xfa/0x3f0 [ 1251.028797] ? mark_held_locks+0xf0/0xf0 [ 1251.028802] ? ip6_rcv_finish_core.constprop.0.isra.0+0x550/0x550 [ 1251.028805] ? mark_held_locks+0xf0/0xf0 [ 1251.028809] __netif_receive_skb_one_core+0xae/0x180 [ 1251.028813] ? __netif_receive_skb_core+0x3270/0x3270 [ 1251.028817] ? lock_acquire+0x170/0x3c0 [ 1251.028820] ? process_backlog+0x1d0/0x700 [ 1251.028824] __netif_receive_skb+0x27/0x1c0 [ 1251.028828] process_backlog+0x241/0x700 [ 1251.028831] ? net_rx_action+0x260/0xfb0 [ 1251.028834] net_rx_action+0x4ac/0xfb0 [ 1251.028838] ? napi_complete_done+0x570/0x570 [ 1251.028842] ? check_preemption_disabled+0x41/0x280 [ 1251.028846] __do_softirq+0x265/0x980 [ 1251.028849] do_softirq_own_stack+0x2a/0x40 [ 1251.028852] [ 1251.028855] do_softirq.part.0+0x160/0x1c0 [ 1251.028859] ? __dev_queue_xmit+0x15f5/0x2e00 [ 1251.028863] __local_bh_enable_ip+0x20e/0x270 [ 1251.028866] __dev_queue_xmit+0x1628/0x2e00 [ 1251.028870] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1251.028874] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1251.028877] ? netdev_pick_tx+0x2f0/0x2f0 [ 1251.028880] ? skb_dequeue+0x125/0x180 [ 1251.028883] ? tx+0x4b/0xb0 [ 1251.028887] ? lock_downgrade+0x720/0x720 [ 1251.028890] ? trace_hardirqs_off+0x64/0x200 [ 1251.028894] ? _raw_spin_unlock_irq+0x24/0x80 [ 1251.028897] ? aoe_exit+0x40/0x40 [ 1251.028900] ? aoe_exit+0x40/0x40 [ 1251.028903] tx+0x68/0xb0 [ 1251.028906] kthread+0x1d9/0x390 [ 1251.028910] ? lock_acquire+0x170/0x3c0 [ 1251.028913] ? ktcomplete+0x300/0x300 [ 1251.028916] ? wake_up_q+0xe0/0xe0 [ 1251.028920] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1251.028924] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1251.028928] ? __kthread_parkme+0x133/0x1e0 [ 1251.028931] ? ktcomplete+0x300/0x300 [ 1251.028934] kthread+0x33f/0x460 [ 1251.028942] ? kthread_park+0x180/0x180 [ 1251.028945] ret_from_fork+0x24/0x30 [ 1251.029129] Kernel panic - not syncing: softlockup: hung tasks [ 1251.029143] CPU: 0 PID: 25554 Comm: syz-executor.4 Tainted: G L 4.19.211-syzkaller #0 [ 1251.029149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1251.029153] Call Trace: [ 1251.029159] [ 1251.029172] dump_stack+0x1fc/0x2ef [ 1251.029189] panic+0x26a/0x50e [ 1251.029203] ? __warn_printk+0xf3/0xf3 [ 1251.029220] ? cpumask_next+0x3c/0x40 [ 1251.029232] ? printk_safe_flush+0xd6/0x120 [ 1251.029247] ? watchdog_timer_fn.cold+0x5/0x25 [ 1251.029261] ? watchdog_timer_fn+0x53e/0x580 [ 1251.029278] watchdog_timer_fn.cold+0x16/0x25 [ 1251.029296] __hrtimer_run_queues+0x3f6/0xe60 [ 1251.029312] ? softlockup_fn+0xb0/0xb0 [ 1251.029332] ? hrtimer_fixup_free+0xa0/0xa0 [ 1251.029343] ? kvm_clock_get_cycles+0x14/0x30 [ 1251.029354] ? ktime_get_update_offsets_now+0x2ec/0x460 [ 1251.029374] hrtimer_interrupt+0x326/0x9e0 [ 1251.029398] smp_apic_timer_interrupt+0x10c/0x550 [ 1251.029414] apic_timer_interrupt+0xf/0x20 [ 1251.029426] RIP: 0010:lock_acquire+0x1ec/0x3c0 [ 1251.029435] Code: 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 b7 01 00 00 48 83 3d 09 2e a6 08 00 0f 84 2a 01 00 00 48 8b 7c 24 08 57 9d <0f> 1f 44 00 00 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 65 8b [ 1251.029446] RSP: 0018:ffff8880ba006ee0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 1251.029458] RAX: 1ffffffff13e3051 RBX: ffff8880ab294200 RCX: e849679332d84bd5 [ 1251.029465] RDX: dffffc0000000000 RSI: 0000000018c72b4c RDI: 0000000000000286 [ 1251.029472] RBP: ffffffff89f85fa0 R08: 0000000033cf6708 R09: 0000000000000005 [ 1251.029477] R10: ffff8880ab294b50 R11: 0000000000074071 R12: 0000000000000000 [ 1251.029483] R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000000000 [ 1251.029494] ? apic_timer_interrupt+0xa/0x20 [ 1251.029517] is_bpf_text_address+0x36/0x1b0 [ 1251.029527] ? __bpf_address_lookup+0x330/0x330 [ 1251.029539] kernel_text_address+0xbd/0xf0 [ 1251.029551] __kernel_text_address+0x9/0x30 [ 1251.029561] unwind_get_return_address+0x51/0x90 [ 1251.029572] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.029582] __save_stack_trace+0xaf/0x190 [ 1251.029602] kasan_kmalloc+0xeb/0x160 [ 1251.029614] ? kmem_cache_alloc_trace+0x11a/0x380 [ 1251.029624] ? br_nf_forward_ip+0x34d/0x15e0 [ 1251.029633] ? nf_hook_slow+0xc5/0x1e0 [ 1251.029642] ? __br_forward+0x354/0xae0 [ 1251.029652] ? maybe_deliver+0x292/0x380 [ 1251.029661] ? br_flood+0x158/0x4d0 [ 1251.029670] ? br_handle_frame_finish+0xf41/0x1410 [ 1251.029682] ? br_nf_hook_thresh+0x2a3/0x330 [ 1251.029694] ? br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 [ 1251.029706] ? br_nf_pre_routing_ipv6+0x3f4/0x860 [ 1251.029717] ? br_nf_pre_routing+0xf05/0x1500 [ 1251.029728] ? nf_hook_slow+0xc5/0x1e0 [ 1251.029739] ? br_handle_frame+0xa60/0x13b0 [ 1251.029749] ? __netif_receive_skb_core+0x929/0x3270 [ 1251.029760] ? __netif_receive_skb_one_core+0xae/0x180 [ 1251.029771] ? __netif_receive_skb+0x27/0x1c0 [ 1251.029782] ? process_backlog+0x241/0x700 [ 1251.029792] ? net_rx_action+0x4ac/0xfb0 [ 1251.029802] ? __do_softirq+0x265/0x980 [ 1251.029812] ? irq_exit+0x215/0x260 [ 1251.029823] ? smp_apic_timer_interrupt+0x136/0x550 [ 1251.029835] ? apic_timer_interrupt+0xf/0x20 [ 1251.029846] ? PageHuge+0x21/0x160 [ 1251.029857] ? page_remove_file_rmap+0x3e/0xa30 [ 1251.029868] ? page_remove_rmap+0xe5/0x120 [ 1251.029880] ? unmap_page_range+0x147d/0x2c50 [ 1251.029891] ? unmap_single_vma+0x198/0x300 [ 1251.029902] ? unmap_vmas+0xa9/0x180 [ 1251.029911] ? exit_mmap+0x2b9/0x530 [ 1251.029922] ? mmput+0x14e/0x4a0 [ 1251.029933] ? do_exit+0xaec/0x2be0 [ 1251.029942] ? do_group_exit+0x125/0x310 [ 1251.029952] ? get_signal+0x3f2/0x1f70 [ 1251.029962] ? do_signal+0x8f/0x1670 [ 1251.029973] ? exit_to_usermode_loop+0x204/0x2a0 [ 1251.029983] ? do_syscall_64+0x538/0x620 [ 1251.029995] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.030007] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1251.030022] ? rcu_nmi_exit+0xb3/0x180 [ 1251.030036] ? retint_kernel+0x2d/0x2d [ 1251.030058] kmem_cache_alloc_trace+0x11a/0x380 [ 1251.030074] br_nf_forward_ip+0x34d/0x15e0 [ 1251.030089] ? br_nf_forward_arp+0xc90/0xc90 [ 1251.030102] ? rcu_nmi_exit+0xb3/0x180 [ 1251.030117] ? retint_kernel+0x2d/0x2d [ 1251.030137] nf_hook_slow+0xc5/0x1e0 [ 1251.030152] __br_forward+0x354/0xae0 [ 1251.030165] ? br_forward_finish+0x3d0/0x3d0 [ 1251.030174] ? skb_clone+0x151/0x3d0 [ 1251.030190] ? br_dev_queue_push_xmit+0x6c0/0x6c0 [ 1251.030201] ? kmem_cache_alloc+0x315/0x370 [ 1251.030219] maybe_deliver+0x292/0x380 [ 1251.030234] br_flood+0x158/0x4d0 [ 1251.030255] br_handle_frame_finish+0xf41/0x1410 [ 1251.030269] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.030288] ? check_preemption_disabled+0x41/0x280 [ 1251.030302] ? nf_hook_slow+0xf5/0x1e0 [ 1251.030318] br_nf_hook_thresh+0x2a3/0x330 [ 1251.030331] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.030346] ? setup_pre_routing+0x450/0x450 [ 1251.030361] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.030375] ? nf_bridge_update_protocol+0x6e/0x120 [ 1251.030388] ? nf_bridge_encap_header_len+0xb/0x80 [ 1251.030407] br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 [ 1251.030417] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.030432] ? check_preemption_disabled+0x41/0x280 [ 1251.030457] br_nf_pre_routing_ipv6+0x3f4/0x860 [ 1251.030472] ? br_validate_ipv6+0xb80/0xb80 [ 1251.030485] ? __sanitizer_cov_trace_pc+0x4/0x50 [ 1251.030502] ? br_nf_pre_routing+0x1500/0x1500 [ 1251.030515] ? check_preemption_disabled+0x41/0x280 [ 1251.030536] br_nf_pre_routing+0xf05/0x1500 [ 1251.030553] ? br_nf_pre_routing_finish+0x17c0/0x17c0 [ 1251.030569] ? broute_net_init+0x30/0x30 [ 1251.030581] ? ebt_broute+0xd0/0x190 [ 1251.030601] nf_hook_slow+0xc5/0x1e0 [ 1251.030617] br_handle_frame+0xa60/0x13b0 [ 1251.030630] ? kmem_cache_free+0x226/0x260 [ 1251.030643] ? br_handle_local_finish+0x20/0x20 [ 1251.030659] ? br_pass_frame_up+0x6c0/0x6c0 [ 1251.030675] ? br_handle_local_finish+0x20/0x20 [ 1251.030689] __netif_receive_skb_core+0x929/0x3270 [ 1251.030709] ? do_xdp_generic.part.0+0x1a0/0x1a0 [ 1251.030721] ? ipv6_rcv+0xfa/0x3f0 [ 1251.030735] ? mark_held_locks+0xf0/0xf0 [ 1251.030748] ? retint_kernel+0x2d/0x2d [ 1251.030763] ? ip6_rcv_finish_core.constprop.0.isra.0+0x550/0x550 [ 1251.030779] ? __netif_receive_skb_core+0x17f6/0x3270 [ 1251.030796] __netif_receive_skb_one_core+0xae/0x180 [ 1251.030810] ? __netif_receive_skb_core+0x3270/0x3270 [ 1251.030827] ? lock_acquire+0x170/0x3c0 [ 1251.030839] ? process_backlog+0x1d0/0x700 [ 1251.030854] __netif_receive_skb+0x27/0x1c0 [ 1251.030869] process_backlog+0x241/0x700 [ 1251.030883] ? net_rx_action+0x260/0xfb0 [ 1251.030898] net_rx_action+0x4ac/0xfb0 [ 1251.030917] ? napi_complete_done+0x570/0x570 [ 1251.030932] ? check_preemption_disabled+0x41/0x280 [ 1251.030951] __do_softirq+0x265/0x980 [ 1251.030971] irq_exit+0x215/0x260 [ 1251.030983] smp_apic_timer_interrupt+0x136/0x550 [ 1251.030998] apic_timer_interrupt+0xf/0x20 [ 1251.031004] [ 1251.031016] RIP: 0010:PageHuge+0x21/0x160 [ 1251.031028] Code: b5 42 04 00 e9 0b ff ff ff 41 54 55 53 48 89 fb e8 b4 65 ce ff 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 <0f> 85 13 01 00 00 48 8b 2b 31 ff 48 c1 ed 0f 83 e5 01 89 ee e8 b6 [ 1251.031035] RSP: 0018:ffff88805301f6e0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 1251.031046] RAX: dffffc0000000000 RBX: ffffea00023b4cc0 RCX: ffffffff819d5a57 [ 1251.031055] RDX: 1ffffd4000476998 RSI: ffffffff81941fbc RDI: ffffea00023b4cc0 [ 1251.031062] RBP: ffffea00023b4cc0 R08: 0000000000000000 R09: ffffed1016b3ede8 [ 1251.031069] R10: ffff8880b59f6f43 R11: 0000000000000000 R12: 0000000000000000 [ 1251.031077] R13: 0000000000000000 R14: ffffea00023b4cc0 R15: 00007f1a966d6000 [ 1251.031096] ? lock_page_memcg+0xa7/0x220 [ 1251.031108] ? PageHuge+0xc/0x160 [ 1251.031125] page_remove_file_rmap+0x3e/0xa30 [ 1251.031141] page_remove_rmap+0xe5/0x120 [ 1251.031156] unmap_page_range+0x147d/0x2c50 [ 1251.031187] ? vm_normal_page_pmd+0x4c0/0x4c0 [ 1251.031201] ? retint_kernel+0x2d/0x2d [ 1251.031213] ? uprobe_munmap+0x2d/0x4d0 [ 1251.031229] unmap_single_vma+0x198/0x300 [ 1251.031246] unmap_vmas+0xa9/0x180 [ 1251.031260] exit_mmap+0x2b9/0x530 [ 1251.031274] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1251.031286] ? rcu_nmi_exit+0xb3/0x180 [ 1251.031311] ? __khugepaged_exit+0x2a6/0x3e0 [ 1251.031322] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1251.031336] ? kmem_cache_free+0x226/0x260 [ 1251.031350] ? __khugepaged_exit+0x2c7/0x3e0 [ 1251.031365] mmput+0x14e/0x4a0 [ 1251.031379] do_exit+0xaec/0x2be0 [ 1251.031395] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1251.031408] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1251.031420] ? mm_update_next_owner+0x650/0x650 [ 1251.031433] ? rcu_nmi_exit+0xb3/0x180 [ 1251.031463] ? retint_kernel+0x2d/0x2d [ 1251.031483] do_group_exit+0x125/0x310 [ 1251.031498] get_signal+0x3f2/0x1f70 [ 1251.031510] ? retint_kernel+0x2d/0x2d [ 1251.031534] do_signal+0x8f/0x1670 [ 1251.031549] ? rcu_nmi_exit+0xb3/0x180 [ 1251.031564] ? setup_sigcontext+0x820/0x820 [ 1251.031579] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1251.031595] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1251.031608] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1251.031622] ? rcu_nmi_exit+0xb3/0x180 [ 1251.031637] ? retint_kernel+0x2d/0x2d [ 1251.031660] exit_to_usermode_loop+0x204/0x2a0 [ 1251.031676] do_syscall_64+0x538/0x620 [ 1251.031692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.031702] RIP: 0033:0x7f1a966f0049 [ 1251.031713] Code: Bad RIP value. [ 1251.031720] RSP: 002b:00007f1a95065168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1251.031730] RAX: 0000000000000800 RBX: 00007f1a96802f60 RCX: 00007f1a966f0049 [ 1251.031738] RDX: 0000000020000040 RSI: 0000000000000005 RDI: 0000000000000006 [ 1251.031745] RBP: 00007f1a9674a08d R08: 0000000000000000 R09: 0000000000000000 [ 1251.031752] R10: 000000000000a808 R11: 0000000000000246 R12: 0000000000000000 [ 1251.031759] R13: 00007ffcb5997ebf R14: 00007f1a95065300 R15: 0000000000022000 [ 1251.032241] Kernel Offset: disabled [ 1253.806477] Rebooting in 86400 seconds..