Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.3' (ECDSA) to the list of known hosts. 2021/02/07 07:12:24 fuzzer started 2021/02/07 07:12:24 dialing manager at 10.128.0.169:44789 2021/02/07 07:12:24 syscalls: 3469 2021/02/07 07:12:24 code coverage: enabled 2021/02/07 07:12:24 comparison tracing: enabled 2021/02/07 07:12:24 extra coverage: enabled 2021/02/07 07:12:24 setuid sandbox: enabled 2021/02/07 07:12:24 namespace sandbox: enabled 2021/02/07 07:12:24 Android sandbox: /sys/fs/selinux/policy does not exist 2021/02/07 07:12:24 fault injection: enabled 2021/02/07 07:12:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/02/07 07:12:24 net packet injection: enabled 2021/02/07 07:12:24 net device setup: enabled 2021/02/07 07:12:24 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/02/07 07:12:24 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/02/07 07:12:24 USB emulation: enabled 2021/02/07 07:12:24 hci packet injection: enabled 2021/02/07 07:12:24 wifi device emulation: enabled 2021/02/07 07:12:24 fetching corpus: 0, signal 0/2000 (executing program) 2021/02/07 07:12:24 fetching corpus: 50, signal 49544/53307 (executing program) 2021/02/07 07:12:25 fetching corpus: 100, signal 77407/82844 (executing program) 2021/02/07 07:12:25 fetching corpus: 150, signal 101121/108137 (executing program) 2021/02/07 07:12:25 fetching corpus: 200, signal 117260/125826 (executing program) 2021/02/07 07:12:25 fetching corpus: 250, signal 135186/145246 (executing program) 2021/02/07 07:12:25 fetching corpus: 300, signal 147029/158567 (executing program) 2021/02/07 07:12:25 fetching corpus: 350, signal 158664/171642 (executing program) 2021/02/07 07:12:25 fetching corpus: 400, signal 168547/182944 (executing program) 2021/02/07 07:12:26 fetching corpus: 450, signal 177831/193598 (executing program) 2021/02/07 07:12:26 fetching corpus: 500, signal 186057/203217 (executing program) 2021/02/07 07:12:26 fetching corpus: 550, signal 193493/212056 (executing program) 2021/02/07 07:12:26 fetching corpus: 600, signal 201649/221507 (executing program) 2021/02/07 07:12:26 fetching corpus: 650, signal 210096/231229 (executing program) 2021/02/07 07:12:26 fetching corpus: 700, signal 214219/236723 (executing program) 2021/02/07 07:12:26 fetching corpus: 750, signal 220748/244506 (executing program) 2021/02/07 07:12:27 fetching corpus: 800, signal 225797/250848 (executing program) 2021/02/07 07:12:27 fetching corpus: 850, signal 231209/257523 (executing program) 2021/02/07 07:12:27 fetching corpus: 900, signal 238054/265503 (executing program) 2021/02/07 07:12:27 fetching corpus: 950, signal 241767/270465 (executing program) 2021/02/07 07:12:27 fetching corpus: 1000, signal 246657/276539 (executing program) 2021/02/07 07:12:27 fetching corpus: 1050, signal 252358/283373 (executing program) 2021/02/07 07:12:27 fetching corpus: 1100, signal 258718/290804 (executing program) 2021/02/07 07:12:28 fetching corpus: 1150, signal 263593/296833 (executing program) 2021/02/07 07:12:28 fetching corpus: 1200, signal 269410/303627 (executing program) 2021/02/07 07:12:28 fetching corpus: 1250, signal 275074/310259 (executing program) 2021/02/07 07:12:28 fetching corpus: 1300, signal 279184/315470 (executing program) 2021/02/07 07:12:28 fetching corpus: 1350, signal 283061/320456 (executing program) 2021/02/07 07:12:28 fetching corpus: 1400, signal 287242/325707 (executing program) 2021/02/07 07:12:28 fetching corpus: 1450, signal 291885/331394 (executing program) 2021/02/07 07:12:28 fetching corpus: 1500, signal 296263/336772 (executing program) 2021/02/07 07:12:29 fetching corpus: 1550, signal 300069/341585 (executing program) 2021/02/07 07:12:29 fetching corpus: 1600, signal 306050/348396 (executing program) 2021/02/07 07:12:29 fetching corpus: 1650, signal 308536/351952 (executing program) 2021/02/07 07:12:29 fetching corpus: 1700, signal 311809/356203 (executing program) 2021/02/07 07:12:29 fetching corpus: 1750, signal 315347/360715 (executing program) 2021/02/07 07:12:29 fetching corpus: 1800, signal 317917/364293 (executing program) 2021/02/07 07:12:29 fetching corpus: 1850, signal 321360/368651 (executing program) 2021/02/07 07:12:29 fetching corpus: 1900, signal 323999/372322 (executing program) 2021/02/07 07:12:30 fetching corpus: 1950, signal 326584/375877 (executing program) 2021/02/07 07:12:30 fetching corpus: 2000, signal 329348/379607 (executing program) 2021/02/07 07:12:30 fetching corpus: 2050, signal 332168/383380 (executing program) 2021/02/07 07:12:30 fetching corpus: 2100, signal 335884/387929 (executing program) 2021/02/07 07:12:30 fetching corpus: 2150, signal 339409/392272 (executing program) 2021/02/07 07:12:30 fetching corpus: 2200, signal 342119/395862 (executing program) 2021/02/07 07:12:30 fetching corpus: 2250, signal 345672/400158 (executing program) 2021/02/07 07:12:30 fetching corpus: 2300, signal 348635/403975 (executing program) 2021/02/07 07:12:31 fetching corpus: 2350, signal 350978/407217 (executing program) 2021/02/07 07:12:31 fetching corpus: 2400, signal 353848/410960 (executing program) 2021/02/07 07:12:31 fetching corpus: 2450, signal 356101/414146 (executing program) 2021/02/07 07:12:31 fetching corpus: 2500, signal 358562/417475 (executing program) 2021/02/07 07:12:31 fetching corpus: 2550, signal 361584/421274 (executing program) 2021/02/07 07:12:31 fetching corpus: 2600, signal 363796/424361 (executing program) 2021/02/07 07:12:31 fetching corpus: 2650, signal 366118/427508 (executing program) 2021/02/07 07:12:32 fetching corpus: 2700, signal 369680/431729 (executing program) 2021/02/07 07:12:32 fetching corpus: 2750, signal 372203/435012 (executing program) 2021/02/07 07:12:32 fetching corpus: 2800, signal 374238/437887 (executing program) 2021/02/07 07:12:32 fetching corpus: 2850, signal 376134/440594 (executing program) 2021/02/07 07:12:32 fetching corpus: 2900, signal 379165/444321 (executing program) 2021/02/07 07:12:32 fetching corpus: 2950, signal 381055/447055 (executing program) 2021/02/07 07:12:32 fetching corpus: 3000, signal 383387/450088 (executing program) 2021/02/07 07:12:32 fetching corpus: 3050, signal 385752/453233 (executing program) 2021/02/07 07:12:33 fetching corpus: 3100, signal 387452/455791 (executing program) 2021/02/07 07:12:33 fetching corpus: 3150, signal 389068/458223 (executing program) 2021/02/07 07:12:33 fetching corpus: 3200, signal 391751/461578 (executing program) 2021/02/07 07:12:33 fetching corpus: 3250, signal 394536/464949 (executing program) 2021/02/07 07:12:33 fetching corpus: 3300, signal 396937/468059 (executing program) 2021/02/07 07:12:33 fetching corpus: 3350, signal 398476/470419 (executing program) 2021/02/07 07:12:33 fetching corpus: 3400, signal 400464/473099 (executing program) 2021/02/07 07:12:33 fetching corpus: 3450, signal 401911/475351 (executing program) 2021/02/07 07:12:34 fetching corpus: 3500, signal 404928/478935 (executing program) 2021/02/07 07:12:34 fetching corpus: 3550, signal 406229/481039 (executing program) 2021/02/07 07:12:34 fetching corpus: 3600, signal 408376/483923 (executing program) 2021/02/07 07:12:34 fetching corpus: 3650, signal 409828/486146 (executing program) 2021/02/07 07:12:34 fetching corpus: 3700, signal 411701/488758 (executing program) 2021/02/07 07:12:34 fetching corpus: 3750, signal 414048/491667 (executing program) 2021/02/07 07:12:34 fetching corpus: 3800, signal 415818/494130 (executing program) 2021/02/07 07:12:35 fetching corpus: 3850, signal 418462/497281 (executing program) 2021/02/07 07:12:35 fetching corpus: 3900, signal 420580/500006 (executing program) 2021/02/07 07:12:35 fetching corpus: 3950, signal 421891/502112 (executing program) 2021/02/07 07:12:35 fetching corpus: 4000, signal 424230/504936 (executing program) 2021/02/07 07:12:35 fetching corpus: 4050, signal 425384/506859 (executing program) 2021/02/07 07:12:35 fetching corpus: 4100, signal 426617/508861 (executing program) 2021/02/07 07:12:35 fetching corpus: 4150, signal 428924/511725 (executing program) 2021/02/07 07:12:35 fetching corpus: 4200, signal 431155/514450 (executing program) 2021/02/07 07:12:36 fetching corpus: 4250, signal 433290/517106 (executing program) 2021/02/07 07:12:36 fetching corpus: 4300, signal 435004/519438 (executing program) 2021/02/07 07:12:36 fetching corpus: 4350, signal 436393/521534 (executing program) 2021/02/07 07:12:36 fetching corpus: 4400, signal 437646/523514 (executing program) 2021/02/07 07:12:36 fetching corpus: 4450, signal 439479/525943 (executing program) 2021/02/07 07:12:36 fetching corpus: 4500, signal 441317/528363 (executing program) 2021/02/07 07:12:36 fetching corpus: 4550, signal 442501/530234 (executing program) 2021/02/07 07:12:36 fetching corpus: 4600, signal 444362/532669 (executing program) 2021/02/07 07:12:37 fetching corpus: 4650, signal 445532/534545 (executing program) 2021/02/07 07:12:37 fetching corpus: 4700, signal 447093/536705 (executing program) 2021/02/07 07:12:37 fetching corpus: 4750, signal 448573/538733 (executing program) 2021/02/07 07:12:37 fetching corpus: 4800, signal 450261/540986 (executing program) 2021/02/07 07:12:37 fetching corpus: 4850, signal 451189/542653 (executing program) 2021/02/07 07:12:37 fetching corpus: 4900, signal 452533/544622 (executing program) 2021/02/07 07:12:37 fetching corpus: 4950, signal 454600/547075 (executing program) 2021/02/07 07:12:38 fetching corpus: 5000, signal 456296/549266 (executing program) 2021/02/07 07:12:38 fetching corpus: 5050, signal 457814/551351 (executing program) 2021/02/07 07:12:38 fetching corpus: 5100, signal 459354/553441 (executing program) 2021/02/07 07:12:38 fetching corpus: 5150, signal 460484/555182 (executing program) 2021/02/07 07:12:38 fetching corpus: 5200, signal 461844/557132 (executing program) 2021/02/07 07:12:38 fetching corpus: 5250, signal 463579/559351 (executing program) 2021/02/07 07:12:38 fetching corpus: 5300, signal 465313/561530 (executing program) 2021/02/07 07:12:38 fetching corpus: 5350, signal 466378/563258 (executing program) 2021/02/07 07:12:39 fetching corpus: 5400, signal 467725/565157 (executing program) 2021/02/07 07:12:39 fetching corpus: 5450, signal 469086/567003 (executing program) 2021/02/07 07:12:39 fetching corpus: 5500, signal 471170/569441 (executing program) 2021/02/07 07:12:39 fetching corpus: 5550, signal 472153/571014 (executing program) 2021/02/07 07:12:39 fetching corpus: 5600, signal 473290/572713 (executing program) 2021/02/07 07:12:39 fetching corpus: 5650, signal 475115/574951 (executing program) 2021/02/07 07:12:39 fetching corpus: 5700, signal 476174/576607 (executing program) 2021/02/07 07:12:39 fetching corpus: 5750, signal 477446/578391 (executing program) 2021/02/07 07:12:40 fetching corpus: 5800, signal 479395/580661 (executing program) 2021/02/07 07:12:40 fetching corpus: 5850, signal 480903/582596 (executing program) 2021/02/07 07:12:40 fetching corpus: 5900, signal 482025/584251 (executing program) 2021/02/07 07:12:40 fetching corpus: 5950, signal 483398/586091 (executing program) 2021/02/07 07:12:40 fetching corpus: 6000, signal 485022/588148 (executing program) 2021/02/07 07:12:40 fetching corpus: 6050, signal 486064/589745 (executing program) 2021/02/07 07:12:40 fetching corpus: 6100, signal 487211/591434 (executing program) 2021/02/07 07:12:41 fetching corpus: 6150, signal 488219/592988 (executing program) 2021/02/07 07:12:41 fetching corpus: 6200, signal 489442/594692 (executing program) 2021/02/07 07:12:41 fetching corpus: 6250, signal 491080/596703 (executing program) 2021/02/07 07:12:41 fetching corpus: 6300, signal 491951/598157 (executing program) 2021/02/07 07:12:41 fetching corpus: 6350, signal 492950/599683 (executing program) 2021/02/07 07:12:41 fetching corpus: 6400, signal 494199/601410 (executing program) 2021/02/07 07:12:41 fetching corpus: 6450, signal 495697/603286 (executing program) 2021/02/07 07:12:42 fetching corpus: 6500, signal 496781/604827 (executing program) 2021/02/07 07:12:42 fetching corpus: 6550, signal 497848/606360 (executing program) 2021/02/07 07:12:42 fetching corpus: 6600, signal 499624/608431 (executing program) 2021/02/07 07:12:42 fetching corpus: 6650, signal 501520/610580 (executing program) 2021/02/07 07:12:42 fetching corpus: 6700, signal 502651/612147 (executing program) 2021/02/07 07:12:42 fetching corpus: 6750, signal 503629/613650 (executing program) 2021/02/07 07:12:42 fetching corpus: 6800, signal 504599/615098 (executing program) 2021/02/07 07:12:43 fetching corpus: 6850, signal 505929/616767 (executing program) 2021/02/07 07:12:43 fetching corpus: 6900, signal 506898/618243 (executing program) 2021/02/07 07:12:43 fetching corpus: 6950, signal 507814/619632 (executing program) 2021/02/07 07:12:43 fetching corpus: 7000, signal 508807/621025 (executing program) 2021/02/07 07:12:43 fetching corpus: 7050, signal 509813/622451 (executing program) 2021/02/07 07:12:43 fetching corpus: 7100, signal 510839/623922 (executing program) 2021/02/07 07:12:43 fetching corpus: 7150, signal 512073/625517 (executing program) 2021/02/07 07:12:44 fetching corpus: 7200, signal 512963/626890 (executing program) 2021/02/07 07:12:44 fetching corpus: 7250, signal 513967/628357 (executing program) 2021/02/07 07:12:44 fetching corpus: 7300, signal 515025/629837 (executing program) 2021/02/07 07:12:44 fetching corpus: 7350, signal 516254/631382 (executing program) 2021/02/07 07:12:44 fetching corpus: 7400, signal 517056/632674 (executing program) 2021/02/07 07:12:44 fetching corpus: 7450, signal 517880/633941 (executing program) 2021/02/07 07:12:44 fetching corpus: 7500, signal 518953/635387 (executing program) 2021/02/07 07:12:44 fetching corpus: 7550, signal 519805/636787 (executing program) 2021/02/07 07:12:44 fetching corpus: 7600, signal 520857/638206 (executing program) 2021/02/07 07:12:45 fetching corpus: 7650, signal 521805/639582 (executing program) 2021/02/07 07:12:45 fetching corpus: 7700, signal 522774/640954 (executing program) 2021/02/07 07:12:45 fetching corpus: 7750, signal 523874/642447 (executing program) 2021/02/07 07:12:45 fetching corpus: 7800, signal 524413/643509 (executing program) 2021/02/07 07:12:45 fetching corpus: 7850, signal 525228/644773 (executing program) 2021/02/07 07:12:45 fetching corpus: 7900, signal 525992/646009 (executing program) 2021/02/07 07:12:45 fetching corpus: 7950, signal 526815/647272 (executing program) 2021/02/07 07:12:46 fetching corpus: 8000, signal 527830/648641 (executing program) 2021/02/07 07:12:46 fetching corpus: 8050, signal 529055/650160 (executing program) 2021/02/07 07:12:46 fetching corpus: 8100, signal 530074/651542 (executing program) 2021/02/07 07:12:46 fetching corpus: 8150, signal 531078/652888 (executing program) 2021/02/07 07:12:46 fetching corpus: 8200, signal 532132/654294 (executing program) 2021/02/07 07:12:46 fetching corpus: 8250, signal 533477/655905 (executing program) 2021/02/07 07:12:46 fetching corpus: 8300, signal 534100/657000 (executing program) 2021/02/07 07:12:46 fetching corpus: 8350, signal 535075/658288 (executing program) 2021/02/07 07:12:46 fetching corpus: 8400, signal 535769/659451 (executing program) 2021/02/07 07:12:47 fetching corpus: 8450, signal 536963/660873 (executing program) 2021/02/07 07:12:47 fetching corpus: 8500, signal 537817/662140 (executing program) 2021/02/07 07:12:47 fetching corpus: 8550, signal 538684/663404 (executing program) 2021/02/07 07:12:47 fetching corpus: 8600, signal 539752/664794 (executing program) 2021/02/07 07:12:47 fetching corpus: 8650, signal 540584/666017 (executing program) 2021/02/07 07:12:47 fetching corpus: 8700, signal 541390/667208 (executing program) 2021/02/07 07:12:47 fetching corpus: 8750, signal 541996/668314 (executing program) 2021/02/07 07:12:47 fetching corpus: 8800, signal 542806/669455 (executing program) 2021/02/07 07:12:48 fetching corpus: 8850, signal 543476/670561 (executing program) 2021/02/07 07:12:48 fetching corpus: 8900, signal 544304/671773 (executing program) 2021/02/07 07:12:48 fetching corpus: 8950, signal 544890/672861 (executing program) 2021/02/07 07:12:48 fetching corpus: 9000, signal 545964/674171 (executing program) 2021/02/07 07:12:48 fetching corpus: 9050, signal 546868/675406 (executing program) 2021/02/07 07:12:48 fetching corpus: 9100, signal 547974/676817 (executing program) 2021/02/07 07:12:48 fetching corpus: 9150, signal 548551/677846 (executing program) 2021/02/07 07:12:48 fetching corpus: 9200, signal 549542/679147 (executing program) 2021/02/07 07:12:49 fetching corpus: 9250, signal 550331/680269 (executing program) 2021/02/07 07:12:49 fetching corpus: 9300, signal 550974/681326 (executing program) 2021/02/07 07:12:49 fetching corpus: 9350, signal 551858/682527 (executing program) 2021/02/07 07:12:49 fetching corpus: 9400, signal 552523/683581 (executing program) 2021/02/07 07:12:49 fetching corpus: 9450, signal 553211/684639 (executing program) 2021/02/07 07:12:49 fetching corpus: 9500, signal 553949/685737 (executing program) 2021/02/07 07:12:49 fetching corpus: 9550, signal 554755/686830 (executing program) 2021/02/07 07:12:49 fetching corpus: 9600, signal 555324/687817 (executing program) 2021/02/07 07:12:50 fetching corpus: 9650, signal 556126/688915 (executing program) 2021/02/07 07:12:50 fetching corpus: 9700, signal 556926/690018 (executing program) 2021/02/07 07:12:50 fetching corpus: 9750, signal 557965/691215 (executing program) 2021/02/07 07:12:50 fetching corpus: 9800, signal 558807/692369 (executing program) 2021/02/07 07:12:50 fetching corpus: 9850, signal 559575/693466 (executing program) 2021/02/07 07:12:50 fetching corpus: 9900, signal 560405/694581 (executing program) 2021/02/07 07:12:51 fetching corpus: 9950, signal 561441/695801 (executing program) 2021/02/07 07:12:51 fetching corpus: 10000, signal 562125/696792 (executing program) 2021/02/07 07:12:51 fetching corpus: 10050, signal 563318/698081 (executing program) 2021/02/07 07:12:51 fetching corpus: 10100, signal 563942/699127 (executing program) 2021/02/07 07:12:51 fetching corpus: 10150, signal 564832/700266 (executing program) 2021/02/07 07:12:51 fetching corpus: 10200, signal 565553/701298 (executing program) 2021/02/07 07:12:51 fetching corpus: 10250, signal 566428/702400 (executing program) 2021/02/07 07:12:51 fetching corpus: 10300, signal 567854/703812 (executing program) 2021/02/07 07:12:51 fetching corpus: 10350, signal 568555/704786 (executing program) 2021/02/07 07:12:52 fetching corpus: 10400, signal 569389/705879 (executing program) 2021/02/07 07:12:52 fetching corpus: 10450, signal 570066/706905 (executing program) 2021/02/07 07:12:52 fetching corpus: 10500, signal 570906/707941 (executing program) 2021/02/07 07:12:52 fetching corpus: 10550, signal 571574/708940 (executing program) 2021/02/07 07:12:52 fetching corpus: 10600, signal 572265/709908 (executing program) 2021/02/07 07:12:52 fetching corpus: 10650, signal 573049/710950 (executing program) 2021/02/07 07:12:52 fetching corpus: 10700, signal 573689/711937 (executing program) 2021/02/07 07:12:52 fetching corpus: 10750, signal 574515/712979 (executing program) 2021/02/07 07:12:53 fetching corpus: 10800, signal 575282/714022 (executing program) 2021/02/07 07:12:53 fetching corpus: 10850, signal 575921/714966 (executing program) 2021/02/07 07:12:53 fetching corpus: 10900, signal 576400/715844 (executing program) 2021/02/07 07:12:53 fetching corpus: 10950, signal 577102/716806 (executing program) 2021/02/07 07:12:53 fetching corpus: 11000, signal 577935/717827 (executing program) 2021/02/07 07:12:53 fetching corpus: 11050, signal 578551/718734 (executing program) 2021/02/07 07:12:53 fetching corpus: 11100, signal 579080/719568 (executing program) 2021/02/07 07:12:54 fetching corpus: 11150, signal 579715/720485 (executing program) 2021/02/07 07:12:54 fetching corpus: 11200, signal 580511/721472 (executing program) 2021/02/07 07:12:54 fetching corpus: 11250, signal 581198/722401 (executing program) 2021/02/07 07:12:54 fetching corpus: 11300, signal 581980/723398 (executing program) 2021/02/07 07:12:54 fetching corpus: 11350, signal 582695/724327 (executing program) 2021/02/07 07:12:54 fetching corpus: 11400, signal 583394/725225 (executing program) 2021/02/07 07:12:54 fetching corpus: 11450, signal 584053/726141 (executing program) 2021/02/07 07:12:54 fetching corpus: 11500, signal 584655/727034 (executing program) 2021/02/07 07:12:55 fetching corpus: 11550, signal 585201/727942 (executing program) 2021/02/07 07:12:55 fetching corpus: 11600, signal 585675/728796 (executing program) 2021/02/07 07:12:55 fetching corpus: 11650, signal 586363/729706 (executing program) 2021/02/07 07:12:55 fetching corpus: 11700, signal 587328/730757 (executing program) 2021/02/07 07:12:55 fetching corpus: 11750, signal 587914/731643 (executing program) 2021/02/07 07:12:55 fetching corpus: 11800, signal 588594/732541 (executing program) 2021/02/07 07:12:55 fetching corpus: 11850, signal 589415/733520 (executing program) 2021/02/07 07:12:56 fetching corpus: 11900, signal 589912/734357 (executing program) 2021/02/07 07:12:56 fetching corpus: 11950, signal 590656/735315 (executing program) 2021/02/07 07:12:56 fetching corpus: 12000, signal 591932/736510 (executing program) 2021/02/07 07:12:56 fetching corpus: 12050, signal 592712/737439 (executing program) 2021/02/07 07:12:56 fetching corpus: 12100, signal 593474/738413 (executing program) 2021/02/07 07:12:56 fetching corpus: 12150, signal 593854/739156 (executing program) 2021/02/07 07:12:56 fetching corpus: 12200, signal 594652/740087 (executing program) 2021/02/07 07:12:56 fetching corpus: 12250, signal 595230/740932 (executing program) 2021/02/07 07:12:57 fetching corpus: 12300, signal 595728/741748 (executing program) 2021/02/07 07:12:57 fetching corpus: 12350, signal 596362/742603 (executing program) 2021/02/07 07:12:57 fetching corpus: 12400, signal 597016/743460 (executing program) 2021/02/07 07:12:57 fetching corpus: 12450, signal 598237/744536 (executing program) 2021/02/07 07:12:57 fetching corpus: 12500, signal 598691/745327 (executing program) 2021/02/07 07:12:57 fetching corpus: 12550, signal 599389/746233 (executing program) 2021/02/07 07:12:57 fetching corpus: 12600, signal 600178/747127 (executing program) 2021/02/07 07:12:57 fetching corpus: 12650, signal 600810/748003 (executing program) 2021/02/07 07:12:58 fetching corpus: 12700, signal 601610/748923 (executing program) 2021/02/07 07:12:58 fetching corpus: 12750, signal 602182/749786 (executing program) 2021/02/07 07:12:58 fetching corpus: 12800, signal 602746/750578 (executing program) 2021/02/07 07:12:58 fetching corpus: 12850, signal 603467/751426 (executing program) 2021/02/07 07:12:58 fetching corpus: 12900, signal 604057/752247 (executing program) 2021/02/07 07:12:58 fetching corpus: 12950, signal 604617/753088 (executing program) 2021/02/07 07:12:58 fetching corpus: 13000, signal 605313/753903 (executing program) 2021/02/07 07:12:58 fetching corpus: 13050, signal 606106/754801 (executing program) 2021/02/07 07:12:59 fetching corpus: 13100, signal 606708/755597 (executing program) 2021/02/07 07:12:59 fetching corpus: 13150, signal 607532/756453 (executing program) 2021/02/07 07:12:59 fetching corpus: 13200, signal 608281/757262 (executing program) 2021/02/07 07:12:59 fetching corpus: 13250, signal 608734/758018 (executing program) 2021/02/07 07:12:59 fetching corpus: 13300, signal 609429/758827 (executing program) 2021/02/07 07:12:59 fetching corpus: 13350, signal 609885/759539 (executing program) 2021/02/07 07:12:59 fetching corpus: 13400, signal 610544/760330 (executing program) 2021/02/07 07:12:59 fetching corpus: 13450, signal 611204/761154 (executing program) 2021/02/07 07:13:00 fetching corpus: 13500, signal 611834/761947 (executing program) 2021/02/07 07:13:00 fetching corpus: 13550, signal 612276/762717 (executing program) 2021/02/07 07:13:00 fetching corpus: 13600, signal 612805/763463 (executing program) 2021/02/07 07:13:00 fetching corpus: 13650, signal 613575/764254 (executing program) 2021/02/07 07:13:00 fetching corpus: 13700, signal 614195/765016 (executing program) 2021/02/07 07:13:00 fetching corpus: 13750, signal 614873/765804 (executing program) 2021/02/07 07:13:00 fetching corpus: 13800, signal 615671/766642 (executing program) 2021/02/07 07:13:01 fetching corpus: 13850, signal 616388/767493 (executing program) 2021/02/07 07:13:01 fetching corpus: 13900, signal 616983/768244 (executing program) 2021/02/07 07:13:01 fetching corpus: 13950, signal 617661/769030 (executing program) 2021/02/07 07:13:01 fetching corpus: 14000, signal 618180/769775 (executing program) 2021/02/07 07:13:01 fetching corpus: 14050, signal 618583/770448 (executing program) 2021/02/07 07:13:01 fetching corpus: 14100, signal 619182/771189 (executing program) 2021/02/07 07:13:01 fetching corpus: 14150, signal 620275/772082 (executing program) 2021/02/07 07:13:01 fetching corpus: 14200, signal 620758/772750 (executing program) 2021/02/07 07:13:01 fetching corpus: 14250, signal 621434/773465 (executing program) 2021/02/07 07:13:02 fetching corpus: 14300, signal 622012/774216 (executing program) 2021/02/07 07:13:02 fetching corpus: 14350, signal 622519/774908 (executing program) 2021/02/07 07:13:02 fetching corpus: 14400, signal 623323/775693 (executing program) 2021/02/07 07:13:02 fetching corpus: 14450, signal 623882/776405 (executing program) 2021/02/07 07:13:02 fetching corpus: 14500, signal 624388/777086 (executing program) 2021/02/07 07:13:02 fetching corpus: 14550, signal 625139/777816 (executing program) 2021/02/07 07:13:02 fetching corpus: 14600, signal 625594/778480 (executing program) 2021/02/07 07:13:03 fetching corpus: 14650, signal 626009/779129 (executing program) 2021/02/07 07:13:03 fetching corpus: 14700, signal 626686/779853 (executing program) 2021/02/07 07:13:03 fetching corpus: 14750, signal 627273/780514 (executing program) 2021/02/07 07:13:03 fetching corpus: 14800, signal 627819/781180 (executing program) 2021/02/07 07:13:03 fetching corpus: 14850, signal 628210/781811 (executing program) 2021/02/07 07:13:03 fetching corpus: 14900, signal 628749/782502 (executing program) 2021/02/07 07:13:03 fetching corpus: 14950, signal 629184/783132 (executing program) 2021/02/07 07:13:04 fetching corpus: 15000, signal 629621/783736 (executing program) 2021/02/07 07:13:04 fetching corpus: 15050, signal 630087/784369 (executing program) 2021/02/07 07:13:04 fetching corpus: 15100, signal 631261/785204 (executing program) 2021/02/07 07:13:04 fetching corpus: 15150, signal 631883/785887 (executing program) 2021/02/07 07:13:04 fetching corpus: 15200, signal 632487/786594 (executing program) 2021/02/07 07:13:04 fetching corpus: 15250, signal 633156/787272 (executing program) 2021/02/07 07:13:04 fetching corpus: 15300, signal 633674/787908 (executing program) 2021/02/07 07:13:04 fetching corpus: 15350, signal 634342/788579 (executing program) 2021/02/07 07:13:04 fetching corpus: 15400, signal 634920/789220 (executing program) 2021/02/07 07:13:05 fetching corpus: 15450, signal 635309/789860 (executing program) 2021/02/07 07:13:05 fetching corpus: 15500, signal 635943/790539 (executing program) 2021/02/07 07:13:05 fetching corpus: 15550, signal 636450/791187 (executing program) 2021/02/07 07:13:05 fetching corpus: 15600, signal 636928/791789 (executing program) 2021/02/07 07:13:05 fetching corpus: 15650, signal 637540/792442 (executing program) 2021/02/07 07:13:05 fetching corpus: 15700, signal 637962/793045 (executing program) 2021/02/07 07:13:05 fetching corpus: 15750, signal 638416/793632 (executing program) 2021/02/07 07:13:06 fetching corpus: 15800, signal 639013/794273 (executing program) 2021/02/07 07:13:06 fetching corpus: 15850, signal 639373/794860 (executing program) 2021/02/07 07:13:06 fetching corpus: 15900, signal 640082/795555 (executing program) 2021/02/07 07:13:06 fetching corpus: 15950, signal 640565/796160 (executing program) 2021/02/07 07:13:06 fetching corpus: 16000, signal 641031/796754 (executing program) 2021/02/07 07:13:06 fetching corpus: 16050, signal 641494/797295 (executing program) 2021/02/07 07:13:06 fetching corpus: 16100, signal 642025/797902 (executing program) 2021/02/07 07:13:06 fetching corpus: 16150, signal 642441/798460 (executing program) 2021/02/07 07:13:06 fetching corpus: 16200, signal 642920/799067 (executing program) 2021/02/07 07:13:06 fetching corpus: 16250, signal 643486/799637 (executing program) 2021/02/07 07:13:07 fetching corpus: 16300, signal 644126/800241 (executing program) 2021/02/07 07:13:07 fetching corpus: 16350, signal 644685/800854 (executing program) 2021/02/07 07:13:07 fetching corpus: 16400, signal 645114/801380 (executing program) 2021/02/07 07:13:07 fetching corpus: 16450, signal 645641/801982 (executing program) 2021/02/07 07:13:07 fetching corpus: 16500, signal 646087/802565 (executing program) 2021/02/07 07:13:07 fetching corpus: 16550, signal 646443/803101 (executing program) 2021/02/07 07:13:07 fetching corpus: 16600, signal 646981/803658 (executing program) 2021/02/07 07:13:08 fetching corpus: 16650, signal 647793/804326 (executing program) 2021/02/07 07:13:08 fetching corpus: 16700, signal 648232/804877 (executing program) 2021/02/07 07:13:08 fetching corpus: 16750, signal 648603/805414 (executing program) 2021/02/07 07:13:08 fetching corpus: 16800, signal 648999/805996 (executing program) 2021/02/07 07:13:08 fetching corpus: 16850, signal 649542/806543 (executing program) 2021/02/07 07:13:08 fetching corpus: 16900, signal 650078/807120 (executing program) 2021/02/07 07:13:08 fetching corpus: 16950, signal 650377/807625 (executing program) 2021/02/07 07:13:08 fetching corpus: 17000, signal 650710/808160 (executing program) 2021/02/07 07:13:08 fetching corpus: 17050, signal 651189/808709 (executing program) 2021/02/07 07:13:08 fetching corpus: 17100, signal 651687/809265 (executing program) 2021/02/07 07:13:09 fetching corpus: 17150, signal 652227/809811 (executing program) 2021/02/07 07:13:09 fetching corpus: 17200, signal 652793/810346 (executing program) 2021/02/07 07:13:09 fetching corpus: 17250, signal 653258/810850 (executing program) 2021/02/07 07:13:09 fetching corpus: 17300, signal 653700/811406 (executing program) 2021/02/07 07:13:09 fetching corpus: 17350, signal 654205/811939 (executing program) 2021/02/07 07:13:09 fetching corpus: 17400, signal 654681/812468 (executing program) 2021/02/07 07:13:09 fetching corpus: 17450, signal 655157/813002 (executing program) 2021/02/07 07:13:10 fetching corpus: 17500, signal 655471/813475 (executing program) 2021/02/07 07:13:10 fetching corpus: 17550, signal 655807/814012 (executing program) 2021/02/07 07:13:10 fetching corpus: 17600, signal 656154/814527 (executing program) 2021/02/07 07:13:10 fetching corpus: 17650, signal 656655/815058 (executing program) 2021/02/07 07:13:10 fetching corpus: 17700, signal 657064/815608 (executing program) 2021/02/07 07:13:10 fetching corpus: 17750, signal 657595/816092 (executing program) 2021/02/07 07:13:10 fetching corpus: 17800, signal 658072/816567 (executing program) 2021/02/07 07:13:10 fetching corpus: 17850, signal 658481/817067 (executing program) 2021/02/07 07:13:10 fetching corpus: 17900, signal 659018/817599 (executing program) 2021/02/07 07:13:11 fetching corpus: 17950, signal 659555/818139 (executing program) 2021/02/07 07:13:11 fetching corpus: 18000, signal 660222/818652 (executing program) 2021/02/07 07:13:11 fetching corpus: 18050, signal 660922/819189 (executing program) 2021/02/07 07:13:11 fetching corpus: 18100, signal 661576/819698 (executing program) 2021/02/07 07:13:11 fetching corpus: 18150, signal 662072/820216 (executing program) 2021/02/07 07:13:11 fetching corpus: 18200, signal 662456/820702 (executing program) 2021/02/07 07:13:11 fetching corpus: 18250, signal 663033/821259 (executing program) 2021/02/07 07:13:11 fetching corpus: 18300, signal 663621/821761 (executing program) 2021/02/07 07:13:12 fetching corpus: 18350, signal 664005/822216 (executing program) 2021/02/07 07:13:12 fetching corpus: 18400, signal 664527/822748 (executing program) 2021/02/07 07:13:12 fetching corpus: 18450, signal 664931/823211 (executing program) 2021/02/07 07:13:12 fetching corpus: 18500, signal 665486/823723 (executing program) 2021/02/07 07:13:12 fetching corpus: 18550, signal 665971/824175 (executing program) 2021/02/07 07:13:12 fetching corpus: 18600, signal 666469/824685 (executing program) 2021/02/07 07:13:12 fetching corpus: 18650, signal 666973/825158 (executing program) 2021/02/07 07:13:13 fetching corpus: 18700, signal 667473/825635 (executing program) 2021/02/07 07:13:13 fetching corpus: 18750, signal 667912/826140 (executing program) 2021/02/07 07:13:13 fetching corpus: 18800, signal 668208/826597 (executing program) 2021/02/07 07:13:13 fetching corpus: 18850, signal 668693/827092 (executing program) 2021/02/07 07:13:13 fetching corpus: 18900, signal 669173/827573 (executing program) 2021/02/07 07:13:13 fetching corpus: 18950, signal 669679/828042 (executing program) 2021/02/07 07:13:13 fetching corpus: 19000, signal 670203/828487 (executing program) 2021/02/07 07:13:13 fetching corpus: 19050, signal 670536/828950 (executing program) 2021/02/07 07:13:13 fetching corpus: 19100, signal 670897/829390 (executing program) 2021/02/07 07:13:14 fetching corpus: 19150, signal 671355/829839 (executing program) 2021/02/07 07:13:14 fetching corpus: 19200, signal 671906/830299 (executing program) 2021/02/07 07:13:14 fetching corpus: 19250, signal 672459/830737 (executing program) 2021/02/07 07:13:14 fetching corpus: 19300, signal 672966/831181 (executing program) 2021/02/07 07:13:14 fetching corpus: 19350, signal 673419/831605 (executing program) 2021/02/07 07:13:14 fetching corpus: 19400, signal 673792/832020 (executing program) 2021/02/07 07:13:14 fetching corpus: 19450, signal 674326/832450 (executing program) 2021/02/07 07:13:14 fetching corpus: 19500, signal 674569/832890 (executing program) 2021/02/07 07:13:15 fetching corpus: 19550, signal 675006/833332 (executing program) 2021/02/07 07:13:15 fetching corpus: 19600, signal 675291/833748 (executing program) 2021/02/07 07:13:15 fetching corpus: 19650, signal 675574/834170 (executing program) 2021/02/07 07:13:15 fetching corpus: 19700, signal 675949/834573 (executing program) 2021/02/07 07:13:15 fetching corpus: 19750, signal 676333/835019 (executing program) 2021/02/07 07:13:15 fetching corpus: 19800, signal 676690/835449 (executing program) 2021/02/07 07:13:15 fetching corpus: 19850, signal 677271/835906 (executing program) 2021/02/07 07:13:15 fetching corpus: 19900, signal 677646/836269 (executing program) 2021/02/07 07:13:15 fetching corpus: 19950, signal 677918/836692 (executing program) 2021/02/07 07:13:15 fetching corpus: 20000, signal 678253/837079 (executing program) 2021/02/07 07:13:16 fetching corpus: 20050, signal 678585/837492 (executing program) 2021/02/07 07:13:16 fetching corpus: 20100, signal 678853/837921 (executing program) 2021/02/07 07:13:16 fetching corpus: 20150, signal 679289/838343 (executing program) 2021/02/07 07:13:16 fetching corpus: 20200, signal 679555/838777 (executing program) 2021/02/07 07:13:16 fetching corpus: 20250, signal 679939/839177 (executing program) 2021/02/07 07:13:16 fetching corpus: 20300, signal 680227/839598 (executing program) 2021/02/07 07:13:16 fetching corpus: 20350, signal 680614/839999 (executing program) 2021/02/07 07:13:16 fetching corpus: 20400, signal 681018/840432 (executing program) 2021/02/07 07:13:16 fetching corpus: 20450, signal 681470/840838 (executing program) 2021/02/07 07:13:17 fetching corpus: 20500, signal 681880/841194 (executing program) 2021/02/07 07:13:17 fetching corpus: 20550, signal 682195/841590 (executing program) 2021/02/07 07:13:17 fetching corpus: 20600, signal 682612/841996 (executing program) 2021/02/07 07:13:17 fetching corpus: 20650, signal 683387/842371 (executing program) 2021/02/07 07:13:17 fetching corpus: 20700, signal 683808/842764 (executing program) 2021/02/07 07:13:17 fetching corpus: 20750, signal 684202/843161 (executing program) 2021/02/07 07:13:18 fetching corpus: 20800, signal 684650/843561 (executing program) 2021/02/07 07:13:18 fetching corpus: 20850, signal 685016/843934 (executing program) 2021/02/07 07:13:18 fetching corpus: 20900, signal 685692/844356 (executing program) 2021/02/07 07:13:18 fetching corpus: 20950, signal 686176/844725 (executing program) 2021/02/07 07:13:18 fetching corpus: 21000, signal 686664/845103 (executing program) 2021/02/07 07:13:18 fetching corpus: 21050, signal 687035/845482 (executing program) 2021/02/07 07:13:18 fetching corpus: 21100, signal 687430/845781 (executing program) 2021/02/07 07:13:18 fetching corpus: 21150, signal 687863/845781 (executing program) 2021/02/07 07:13:18 fetching corpus: 21200, signal 688344/845781 (executing program) 2021/02/07 07:13:19 fetching corpus: 21250, signal 688699/845781 (executing program) 2021/02/07 07:13:19 fetching corpus: 21300, signal 689014/845781 (executing program) 2021/02/07 07:13:19 fetching corpus: 21350, signal 689472/845782 (executing program) 2021/02/07 07:13:19 fetching corpus: 21400, signal 689898/845782 (executing program) 2021/02/07 07:13:19 fetching corpus: 21450, signal 690344/845785 (executing program) 2021/02/07 07:13:19 fetching corpus: 21500, signal 690730/845785 (executing program) 2021/02/07 07:13:19 fetching corpus: 21550, signal 691197/845789 (executing program) 2021/02/07 07:13:19 fetching corpus: 21600, signal 691660/845789 (executing program) 2021/02/07 07:13:20 fetching corpus: 21650, signal 691999/845789 (executing program) 2021/02/07 07:13:20 fetching corpus: 21700, signal 692322/845789 (executing program) 2021/02/07 07:13:20 fetching corpus: 21750, signal 692607/845789 (executing program) 2021/02/07 07:13:20 fetching corpus: 21800, signal 692987/845789 (executing program) 2021/02/07 07:13:20 fetching corpus: 21850, signal 693639/845790 (executing program) 2021/02/07 07:13:20 fetching corpus: 21900, signal 694109/845790 (executing program) 2021/02/07 07:13:20 fetching corpus: 21950, signal 694485/845790 (executing program) 2021/02/07 07:13:20 fetching corpus: 22000, signal 695483/845790 (executing program) 2021/02/07 07:13:21 fetching corpus: 22050, signal 695976/845790 (executing program) 2021/02/07 07:13:21 fetching corpus: 22100, signal 696604/845796 (executing program) 2021/02/07 07:13:21 fetching corpus: 22150, signal 697087/845796 (executing program) 2021/02/07 07:13:21 fetching corpus: 22200, signal 697548/845796 (executing program) 2021/02/07 07:13:21 fetching corpus: 22250, signal 697898/845796 (executing program) 2021/02/07 07:13:21 fetching corpus: 22300, signal 698298/845796 (executing program) 2021/02/07 07:13:21 fetching corpus: 22350, signal 698667/845797 (executing program) 2021/02/07 07:13:21 fetching corpus: 22400, signal 699112/845797 (executing program) 2021/02/07 07:13:22 fetching corpus: 22450, signal 699580/845797 (executing program) 2021/02/07 07:13:22 fetching corpus: 22500, signal 699919/845797 (executing program) 2021/02/07 07:13:22 fetching corpus: 22550, signal 700252/845799 (executing program) 2021/02/07 07:13:22 fetching corpus: 22600, signal 700605/845799 (executing program) 2021/02/07 07:13:22 fetching corpus: 22650, signal 700938/845799 (executing program) 2021/02/07 07:13:22 fetching corpus: 22700, signal 701428/845799 (executing program) 2021/02/07 07:13:22 fetching corpus: 22750, signal 701720/845799 (executing program) 2021/02/07 07:13:22 fetching corpus: 22800, signal 702078/845799 (executing program) 2021/02/07 07:13:23 fetching corpus: 22850, signal 702398/845799 (executing program) 2021/02/07 07:13:23 fetching corpus: 22900, signal 702950/845799 (executing program) 2021/02/07 07:13:23 fetching corpus: 22950, signal 703302/845799 (executing program) 2021/02/07 07:13:23 fetching corpus: 23000, signal 703680/845799 (executing program) 2021/02/07 07:13:23 fetching corpus: 23050, signal 704185/845799 (executing program) 2021/02/07 07:13:23 fetching corpus: 23100, signal 704538/845810 (executing program) 2021/02/07 07:13:23 fetching corpus: 23150, signal 704805/845810 (executing program) 2021/02/07 07:13:23 fetching corpus: 23200, signal 705085/845810 (executing program) 2021/02/07 07:13:24 fetching corpus: 23250, signal 705674/845810 (executing program) 2021/02/07 07:13:24 fetching corpus: 23300, signal 706095/845810 (executing program) 2021/02/07 07:13:24 fetching corpus: 23350, signal 706408/845810 (executing program) 2021/02/07 07:13:24 fetching corpus: 23400, signal 706859/845810 (executing program) 2021/02/07 07:13:25 fetching corpus: 23450, signal 707183/845810 (executing program) 2021/02/07 07:13:25 fetching corpus: 23500, signal 707527/845810 (executing program) 2021/02/07 07:13:25 fetching corpus: 23550, signal 707884/845813 (executing program) 2021/02/07 07:13:25 fetching corpus: 23600, signal 708298/845813 (executing program) 2021/02/07 07:13:25 fetching corpus: 23650, signal 708590/845813 (executing program) 2021/02/07 07:13:25 fetching corpus: 23700, signal 708922/845813 (executing program) 2021/02/07 07:13:25 fetching corpus: 23750, signal 709363/845813 (executing program) 2021/02/07 07:13:25 fetching corpus: 23800, signal 709813/845813 (executing program) 2021/02/07 07:13:25 fetching corpus: 23850, signal 710228/845813 (executing program) 2021/02/07 07:13:26 fetching corpus: 23900, signal 710559/845813 (executing program) 2021/02/07 07:13:26 fetching corpus: 23950, signal 710936/845813 (executing program) 2021/02/07 07:13:26 fetching corpus: 24000, signal 711353/845813 (executing program) 2021/02/07 07:13:26 fetching corpus: 24050, signal 711715/845813 (executing program) 2021/02/07 07:13:26 fetching corpus: 24100, signal 712015/845813 (executing program) 2021/02/07 07:13:26 fetching corpus: 24150, signal 712367/845813 (executing program) 2021/02/07 07:13:26 fetching corpus: 24200, signal 712765/845813 (executing program) 2021/02/07 07:13:26 fetching corpus: 24250, signal 713106/845813 (executing program) 2021/02/07 07:13:27 fetching corpus: 24300, signal 713412/845813 (executing program) 2021/02/07 07:13:27 fetching corpus: 24350, signal 713757/845813 (executing program) 2021/02/07 07:13:27 fetching corpus: 24400, signal 714092/845813 (executing program) 2021/02/07 07:13:27 fetching corpus: 24450, signal 714434/845813 (executing program) 2021/02/07 07:13:27 fetching corpus: 24500, signal 714781/845813 (executing program) 2021/02/07 07:13:27 fetching corpus: 24550, signal 715117/845813 (executing program) 2021/02/07 07:13:27 fetching corpus: 24600, signal 715413/845813 (executing program) 2021/02/07 07:13:27 fetching corpus: 24650, signal 715998/845813 (executing program) 2021/02/07 07:13:27 fetching corpus: 24700, signal 716414/845813 (executing program) 2021/02/07 07:13:28 fetching corpus: 24750, signal 716759/845813 (executing program) 2021/02/07 07:13:28 fetching corpus: 24800, signal 717498/845813 (executing program) 2021/02/07 07:13:28 fetching corpus: 24850, signal 718041/845815 (executing program) 2021/02/07 07:13:28 fetching corpus: 24900, signal 718316/845815 (executing program) 2021/02/07 07:13:28 fetching corpus: 24950, signal 718625/845815 (executing program) 2021/02/07 07:13:28 fetching corpus: 25000, signal 719001/845815 (executing program) 2021/02/07 07:13:28 fetching corpus: 25050, signal 719235/845815 (executing program) 2021/02/07 07:13:28 fetching corpus: 25100, signal 719672/845815 (executing program) 2021/02/07 07:13:28 fetching corpus: 25150, signal 720090/845815 (executing program) 2021/02/07 07:13:29 fetching corpus: 25200, signal 720314/845815 (executing program) 2021/02/07 07:13:29 fetching corpus: 25250, signal 720592/845815 (executing program) 2021/02/07 07:13:29 fetching corpus: 25300, signal 720931/845815 (executing program) 2021/02/07 07:13:29 fetching corpus: 25350, signal 721310/845815 (executing program) 2021/02/07 07:13:29 fetching corpus: 25400, signal 721802/845815 (executing program) 2021/02/07 07:13:29 fetching corpus: 25450, signal 722100/845815 (executing program) 2021/02/07 07:13:29 fetching corpus: 25500, signal 722497/845815 (executing program) 2021/02/07 07:13:30 fetching corpus: 25550, signal 722830/845815 (executing program) 2021/02/07 07:13:30 fetching corpus: 25600, signal 723327/845815 (executing program) 2021/02/07 07:13:30 fetching corpus: 25650, signal 723634/845815 (executing program) 2021/02/07 07:13:30 fetching corpus: 25700, signal 723941/845815 (executing program) 2021/02/07 07:13:30 fetching corpus: 25750, signal 724282/845815 (executing program) 2021/02/07 07:13:30 fetching corpus: 25800, signal 724783/845815 (executing program) 2021/02/07 07:13:30 fetching corpus: 25850, signal 725322/845815 (executing program) 2021/02/07 07:13:31 fetching corpus: 25900, signal 725704/845815 (executing program) 2021/02/07 07:13:31 fetching corpus: 25950, signal 726007/845815 (executing program) 2021/02/07 07:13:31 fetching corpus: 26000, signal 726263/845815 (executing program) 2021/02/07 07:13:31 fetching corpus: 26050, signal 726510/845815 (executing program) 2021/02/07 07:13:31 fetching corpus: 26100, signal 727004/845815 (executing program) 2021/02/07 07:13:31 fetching corpus: 26150, signal 727244/845815 (executing program) 2021/02/07 07:13:31 fetching corpus: 26200, signal 727552/845815 (executing program) 2021/02/07 07:13:31 fetching corpus: 26250, signal 727846/845815 (executing program) 2021/02/07 07:13:32 fetching corpus: 26300, signal 728241/845815 (executing program) 2021/02/07 07:13:32 fetching corpus: 26350, signal 728664/845815 (executing program) 2021/02/07 07:13:32 fetching corpus: 26400, signal 729069/845816 (executing program) 2021/02/07 07:13:32 fetching corpus: 26450, signal 729340/845816 (executing program) 2021/02/07 07:13:32 fetching corpus: 26500, signal 729716/845816 (executing program) 2021/02/07 07:13:32 fetching corpus: 26550, signal 729977/845816 (executing program) 2021/02/07 07:13:32 fetching corpus: 26600, signal 730182/845824 (executing program) 2021/02/07 07:13:32 fetching corpus: 26650, signal 730436/845824 (executing program) 2021/02/07 07:13:33 fetching corpus: 26700, signal 730747/845831 (executing program) 2021/02/07 07:13:33 fetching corpus: 26750, signal 731063/845831 (executing program) 2021/02/07 07:13:33 fetching corpus: 26800, signal 731367/845831 (executing program) 2021/02/07 07:13:33 fetching corpus: 26850, signal 731690/845831 (executing program) 2021/02/07 07:13:33 fetching corpus: 26900, signal 731968/845831 (executing program) 2021/02/07 07:13:33 fetching corpus: 26950, signal 732201/845831 (executing program) 2021/02/07 07:13:33 fetching corpus: 27000, signal 732557/845831 (executing program) 2021/02/07 07:13:33 fetching corpus: 27050, signal 732873/845831 (executing program) 2021/02/07 07:13:34 fetching corpus: 27100, signal 733241/845832 (executing program) 2021/02/07 07:13:34 fetching corpus: 27150, signal 733563/845832 (executing program) 2021/02/07 07:13:34 fetching corpus: 27200, signal 733890/845832 (executing program) 2021/02/07 07:13:34 fetching corpus: 27250, signal 734244/845832 (executing program) 2021/02/07 07:13:34 fetching corpus: 27300, signal 734656/845832 (executing program) 2021/02/07 07:13:34 fetching corpus: 27350, signal 734957/845832 (executing program) 2021/02/07 07:13:34 fetching corpus: 27400, signal 735366/845832 (executing program) 2021/02/07 07:13:34 fetching corpus: 27450, signal 735944/845832 (executing program) 2021/02/07 07:13:35 fetching corpus: 27500, signal 736385/845832 (executing program) 2021/02/07 07:13:35 fetching corpus: 27550, signal 736715/845832 (executing program) 2021/02/07 07:13:35 fetching corpus: 27600, signal 737073/845832 (executing program) 2021/02/07 07:13:35 fetching corpus: 27650, signal 737433/845832 (executing program) 2021/02/07 07:13:35 fetching corpus: 27700, signal 737798/845832 (executing program) 2021/02/07 07:13:35 fetching corpus: 27750, signal 738085/845832 (executing program) 2021/02/07 07:13:35 fetching corpus: 27800, signal 738338/845832 (executing program) 2021/02/07 07:13:35 fetching corpus: 27850, signal 738600/845832 (executing program) 2021/02/07 07:13:35 fetching corpus: 27900, signal 739018/845832 (executing program) 2021/02/07 07:13:36 fetching corpus: 27950, signal 739400/845832 (executing program) 2021/02/07 07:13:36 fetching corpus: 28000, signal 739751/845832 (executing program) 2021/02/07 07:13:36 fetching corpus: 28050, signal 740142/845832 (executing program) 2021/02/07 07:13:36 fetching corpus: 28100, signal 740527/845832 (executing program) 2021/02/07 07:13:36 fetching corpus: 28150, signal 740749/845832 (executing program) 2021/02/07 07:13:36 fetching corpus: 28200, signal 741071/845832 (executing program) 2021/02/07 07:13:36 fetching corpus: 28250, signal 741431/845832 (executing program) 2021/02/07 07:13:37 fetching corpus: 28300, signal 741638/845832 (executing program) 2021/02/07 07:13:37 fetching corpus: 28350, signal 742049/845832 (executing program) 2021/02/07 07:13:37 fetching corpus: 28400, signal 742325/845832 (executing program) 2021/02/07 07:13:37 fetching corpus: 28450, signal 742608/845832 (executing program) 2021/02/07 07:13:37 fetching corpus: 28500, signal 742906/845832 (executing program) 2021/02/07 07:13:37 fetching corpus: 28550, signal 743120/845832 (executing program) 2021/02/07 07:13:37 fetching corpus: 28600, signal 743346/845832 (executing program) 2021/02/07 07:13:37 fetching corpus: 28650, signal 743656/845832 (executing program) 2021/02/07 07:13:38 fetching corpus: 28700, signal 743891/845832 (executing program) 2021/02/07 07:13:38 fetching corpus: 28750, signal 744100/845832 (executing program) 2021/02/07 07:13:38 fetching corpus: 28800, signal 744425/845832 (executing program) 2021/02/07 07:13:38 fetching corpus: 28850, signal 744677/845832 (executing program) 2021/02/07 07:13:38 fetching corpus: 28900, signal 745110/845832 (executing program) 2021/02/07 07:13:38 fetching corpus: 28950, signal 745351/845832 (executing program) 2021/02/07 07:13:38 fetching corpus: 29000, signal 745648/845832 (executing program) 2021/02/07 07:13:38 fetching corpus: 29050, signal 745942/845832 (executing program) 2021/02/07 07:13:38 fetching corpus: 29100, signal 746186/845832 (executing program) 2021/02/07 07:13:39 fetching corpus: 29150, signal 746546/845832 (executing program) 2021/02/07 07:13:39 fetching corpus: 29200, signal 746824/845832 (executing program) 2021/02/07 07:13:39 fetching corpus: 29250, signal 747194/845832 (executing program) 2021/02/07 07:13:39 fetching corpus: 29300, signal 747485/845832 (executing program) 2021/02/07 07:13:39 fetching corpus: 29350, signal 747805/845847 (executing program) 2021/02/07 07:13:39 fetching corpus: 29400, signal 748292/845847 (executing program) 2021/02/07 07:13:39 fetching corpus: 29450, signal 748553/845847 (executing program) 2021/02/07 07:13:39 fetching corpus: 29500, signal 748928/845847 (executing program) 2021/02/07 07:13:40 fetching corpus: 29550, signal 749457/845847 (executing program) 2021/02/07 07:13:40 fetching corpus: 29600, signal 749822/845847 (executing program) 2021/02/07 07:13:40 fetching corpus: 29650, signal 750204/845847 (executing program) 2021/02/07 07:13:40 fetching corpus: 29700, signal 750430/845847 (executing program) 2021/02/07 07:13:40 fetching corpus: 29750, signal 750718/845847 (executing program) 2021/02/07 07:13:40 fetching corpus: 29800, signal 751007/845847 (executing program) 2021/02/07 07:13:40 fetching corpus: 29850, signal 751395/845847 (executing program) 2021/02/07 07:13:41 fetching corpus: 29900, signal 751668/845847 (executing program) 2021/02/07 07:13:41 fetching corpus: 29950, signal 751933/845847 (executing program) 2021/02/07 07:13:41 fetching corpus: 30000, signal 752319/845847 (executing program) 2021/02/07 07:13:41 fetching corpus: 30050, signal 752807/845847 (executing program) 2021/02/07 07:13:41 fetching corpus: 30100, signal 753097/845847 (executing program) 2021/02/07 07:13:41 fetching corpus: 30150, signal 753407/845847 (executing program) 2021/02/07 07:13:41 fetching corpus: 30200, signal 753641/845847 (executing program) 2021/02/07 07:13:41 fetching corpus: 30250, signal 754138/845847 (executing program) 2021/02/07 07:13:42 fetching corpus: 30300, signal 754383/845847 (executing program) 2021/02/07 07:13:42 fetching corpus: 30350, signal 754767/845847 (executing program) 2021/02/07 07:13:42 fetching corpus: 30400, signal 755055/845847 (executing program) 2021/02/07 07:13:42 fetching corpus: 30450, signal 755403/845847 (executing program) 2021/02/07 07:13:42 fetching corpus: 30500, signal 755692/845847 (executing program) 2021/02/07 07:13:42 fetching corpus: 30550, signal 755950/845847 (executing program) 2021/02/07 07:13:42 fetching corpus: 30600, signal 756177/845847 (executing program) 2021/02/07 07:13:42 fetching corpus: 30650, signal 756377/845847 (executing program) 2021/02/07 07:13:42 fetching corpus: 30700, signal 756673/845847 (executing program) 2021/02/07 07:13:43 fetching corpus: 30750, signal 756848/845847 (executing program) 2021/02/07 07:13:43 fetching corpus: 30800, signal 757114/845864 (executing program) 2021/02/07 07:13:43 fetching corpus: 30850, signal 757371/845864 (executing program) 2021/02/07 07:13:43 fetching corpus: 30900, signal 757579/845864 (executing program) 2021/02/07 07:13:43 fetching corpus: 30950, signal 757803/845864 (executing program) 2021/02/07 07:13:43 fetching corpus: 31000, signal 758029/845864 (executing program) 2021/02/07 07:13:43 fetching corpus: 31050, signal 758287/845864 (executing program) 2021/02/07 07:13:43 fetching corpus: 31100, signal 758642/845864 (executing program) 2021/02/07 07:13:44 fetching corpus: 31150, signal 758865/845864 (executing program) 2021/02/07 07:13:44 fetching corpus: 31200, signal 759066/845864 (executing program) 2021/02/07 07:13:44 fetching corpus: 31250, signal 759320/845864 (executing program) 2021/02/07 07:13:44 fetching corpus: 31300, signal 759650/845864 (executing program) 2021/02/07 07:13:44 fetching corpus: 31350, signal 759924/845864 (executing program) 2021/02/07 07:13:44 fetching corpus: 31400, signal 760314/845864 (executing program) 2021/02/07 07:13:44 fetching corpus: 31450, signal 760626/845864 (executing program) 2021/02/07 07:13:44 fetching corpus: 31500, signal 760908/845864 (executing program) 2021/02/07 07:13:45 fetching corpus: 31550, signal 761161/845864 (executing program) 2021/02/07 07:13:45 fetching corpus: 31600, signal 761455/845864 (executing program) 2021/02/07 07:13:45 fetching corpus: 31650, signal 761879/845866 (executing program) 2021/02/07 07:13:45 fetching corpus: 31700, signal 762058/845866 (executing program) 2021/02/07 07:13:45 fetching corpus: 31750, signal 762349/845866 (executing program) 2021/02/07 07:13:45 fetching corpus: 31800, signal 762659/845866 (executing program) 2021/02/07 07:13:46 fetching corpus: 31850, signal 762872/845866 (executing program) 2021/02/07 07:13:46 fetching corpus: 31900, signal 763192/845866 (executing program) 2021/02/07 07:13:46 fetching corpus: 31950, signal 763483/845866 (executing program) 2021/02/07 07:13:46 fetching corpus: 32000, signal 763747/845866 (executing program) 2021/02/07 07:13:46 fetching corpus: 32050, signal 764059/845866 (executing program) 2021/02/07 07:13:46 fetching corpus: 32100, signal 764243/845866 (executing program) 2021/02/07 07:13:46 fetching corpus: 32150, signal 764463/845866 (executing program) 2021/02/07 07:13:46 fetching corpus: 32200, signal 764736/845866 (executing program) 2021/02/07 07:13:46 fetching corpus: 32250, signal 764951/845868 (executing program) 2021/02/07 07:13:47 fetching corpus: 32300, signal 765224/845868 (executing program) 2021/02/07 07:13:47 fetching corpus: 32350, signal 765652/845868 (executing program) 2021/02/07 07:13:47 fetching corpus: 32400, signal 765977/845868 (executing program) 2021/02/07 07:13:47 fetching corpus: 32450, signal 766239/845868 (executing program) 2021/02/07 07:13:47 fetching corpus: 32500, signal 766481/845868 (executing program) 2021/02/07 07:13:47 fetching corpus: 32550, signal 767134/845868 (executing program) 2021/02/07 07:13:47 fetching corpus: 32600, signal 767354/845868 (executing program) 2021/02/07 07:13:47 fetching corpus: 32650, signal 767572/845868 (executing program) 2021/02/07 07:13:48 fetching corpus: 32700, signal 767811/845868 (executing program) 2021/02/07 07:13:48 fetching corpus: 32750, signal 768087/845868 (executing program) 2021/02/07 07:13:48 fetching corpus: 32800, signal 768435/845868 (executing program) 2021/02/07 07:13:48 fetching corpus: 32850, signal 768762/845868 (executing program) 2021/02/07 07:13:48 fetching corpus: 32900, signal 768995/845868 (executing program) 2021/02/07 07:13:48 fetching corpus: 32950, signal 769187/845868 (executing program) 2021/02/07 07:13:48 fetching corpus: 33000, signal 769345/845868 (executing program) 2021/02/07 07:13:48 fetching corpus: 33050, signal 769540/845868 (executing program) 2021/02/07 07:13:48 fetching corpus: 33100, signal 769830/845868 (executing program) 2021/02/07 07:13:48 fetching corpus: 33150, signal 770204/845868 (executing program) 2021/02/07 07:13:49 fetching corpus: 33200, signal 770533/845868 (executing program) 2021/02/07 07:13:49 fetching corpus: 33250, signal 770788/845868 (executing program) 2021/02/07 07:13:49 fetching corpus: 33300, signal 771107/845868 (executing program) 2021/02/07 07:13:49 fetching corpus: 33350, signal 771337/845868 (executing program) 2021/02/07 07:13:49 fetching corpus: 33400, signal 771600/845868 (executing program) 2021/02/07 07:13:49 fetching corpus: 33450, signal 771888/845868 (executing program) 2021/02/07 07:13:50 fetching corpus: 33500, signal 772173/845868 (executing program) 2021/02/07 07:13:50 fetching corpus: 33550, signal 772429/845868 (executing program) 2021/02/07 07:13:50 fetching corpus: 33600, signal 772625/845868 (executing program) 2021/02/07 07:13:50 fetching corpus: 33650, signal 772851/845868 (executing program) 2021/02/07 07:13:50 fetching corpus: 33700, signal 773064/845868 (executing program) 2021/02/07 07:13:50 fetching corpus: 33750, signal 773345/845868 (executing program) 2021/02/07 07:13:50 fetching corpus: 33800, signal 773707/845868 (executing program) 2021/02/07 07:13:50 fetching corpus: 33850, signal 773900/845868 (executing program) 2021/02/07 07:13:50 fetching corpus: 33900, signal 774208/845868 (executing program) 2021/02/07 07:13:51 fetching corpus: 33950, signal 774447/845868 (executing program) 2021/02/07 07:13:51 fetching corpus: 34000, signal 774682/845868 (executing program) 2021/02/07 07:13:51 fetching corpus: 34050, signal 774940/845880 (executing program) 2021/02/07 07:13:51 fetching corpus: 34100, signal 775287/845880 (executing program) 2021/02/07 07:13:51 fetching corpus: 34150, signal 775565/845880 (executing program) 2021/02/07 07:13:51 fetching corpus: 34200, signal 775769/845880 (executing program) 2021/02/07 07:13:51 fetching corpus: 34250, signal 776178/845881 (executing program) 2021/02/07 07:13:51 fetching corpus: 34300, signal 776387/845881 (executing program) 2021/02/07 07:13:51 fetching corpus: 34350, signal 776790/845881 (executing program) 2021/02/07 07:13:52 fetching corpus: 34400, signal 777044/845881 (executing program) 2021/02/07 07:13:52 fetching corpus: 34450, signal 777252/845881 (executing program) 2021/02/07 07:13:52 fetching corpus: 34500, signal 777468/845881 (executing program) 2021/02/07 07:13:52 fetching corpus: 34550, signal 777733/845881 (executing program) 2021/02/07 07:13:52 fetching corpus: 34600, signal 778120/845881 (executing program) 2021/02/07 07:13:52 fetching corpus: 34650, signal 778434/845881 (executing program) 2021/02/07 07:13:52 fetching corpus: 34700, signal 778669/845881 (executing program) 2021/02/07 07:13:52 fetching corpus: 34750, signal 778991/845881 (executing program) 2021/02/07 07:13:53 fetching corpus: 34800, signal 779405/845881 (executing program) 2021/02/07 07:13:53 fetching corpus: 34850, signal 779750/845881 (executing program) 2021/02/07 07:13:53 fetching corpus: 34900, signal 780090/845881 (executing program) 2021/02/07 07:13:53 fetching corpus: 34950, signal 780399/845881 (executing program) 2021/02/07 07:13:53 fetching corpus: 35000, signal 780601/845881 (executing program) 2021/02/07 07:13:53 fetching corpus: 35050, signal 780835/845881 (executing program) 2021/02/07 07:13:53 fetching corpus: 35100, signal 781204/845881 (executing program) 2021/02/07 07:13:53 fetching corpus: 35150, signal 781427/845881 (executing program) 2021/02/07 07:13:54 fetching corpus: 35200, signal 781722/845881 (executing program) 2021/02/07 07:13:54 fetching corpus: 35250, signal 781930/845881 (executing program) 2021/02/07 07:13:54 fetching corpus: 35300, signal 782210/845883 (executing program) 2021/02/07 07:13:54 fetching corpus: 35350, signal 782392/845891 (executing program) 2021/02/07 07:13:54 fetching corpus: 35400, signal 782602/845891 (executing program) 2021/02/07 07:13:54 fetching corpus: 35450, signal 782850/845891 (executing program) 2021/02/07 07:13:54 fetching corpus: 35500, signal 783039/845891 (executing program) 2021/02/07 07:13:55 fetching corpus: 35550, signal 783373/845891 (executing program) 2021/02/07 07:13:55 fetching corpus: 35600, signal 783634/845891 (executing program) 2021/02/07 07:13:55 fetching corpus: 35650, signal 783847/845891 (executing program) 2021/02/07 07:13:55 fetching corpus: 35700, signal 784061/845891 (executing program) 2021/02/07 07:13:55 fetching corpus: 35750, signal 784300/845891 (executing program) 2021/02/07 07:13:55 fetching corpus: 35800, signal 784504/845891 (executing program) 2021/02/07 07:13:55 fetching corpus: 35850, signal 784837/845891 (executing program) 2021/02/07 07:13:55 fetching corpus: 35900, signal 785038/845891 (executing program) 2021/02/07 07:13:55 fetching corpus: 35950, signal 785258/845891 (executing program) 2021/02/07 07:13:56 fetching corpus: 36000, signal 785605/845891 (executing program) 2021/02/07 07:13:56 fetching corpus: 36050, signal 785797/845891 (executing program) 2021/02/07 07:13:56 fetching corpus: 36100, signal 785927/845891 (executing program) 2021/02/07 07:13:56 fetching corpus: 36150, signal 786138/845891 (executing program) 2021/02/07 07:13:56 fetching corpus: 36200, signal 786395/845891 (executing program) 2021/02/07 07:13:56 fetching corpus: 36250, signal 786656/845891 (executing program) 2021/02/07 07:13:56 fetching corpus: 36300, signal 786866/845891 (executing program) 2021/02/07 07:13:56 fetching corpus: 36350, signal 787087/845891 (executing program) 2021/02/07 07:13:57 fetching corpus: 36400, signal 787429/845891 (executing program) 2021/02/07 07:13:57 fetching corpus: 36450, signal 787637/845891 (executing program) 2021/02/07 07:13:57 fetching corpus: 36500, signal 787830/845891 (executing program) 2021/02/07 07:13:57 fetching corpus: 36550, signal 788084/845891 (executing program) 2021/02/07 07:13:57 fetching corpus: 36600, signal 788359/845891 (executing program) 2021/02/07 07:13:57 fetching corpus: 36650, signal 788663/845896 (executing program) 2021/02/07 07:13:57 fetching corpus: 36700, signal 789002/845896 (executing program) 2021/02/07 07:13:57 fetching corpus: 36750, signal 789271/845899 (executing program) 2021/02/07 07:13:57 fetching corpus: 36800, signal 789529/845899 (executing program) 2021/02/07 07:13:58 fetching corpus: 36850, signal 789733/845899 (executing program) 2021/02/07 07:13:58 fetching corpus: 36900, signal 789952/845899 (executing program) 2021/02/07 07:13:58 fetching corpus: 36950, signal 790175/845899 (executing program) 2021/02/07 07:13:58 fetching corpus: 37000, signal 790467/845899 (executing program) 2021/02/07 07:13:58 fetching corpus: 37050, signal 790656/845899 (executing program) 2021/02/07 07:13:58 fetching corpus: 37100, signal 790995/845899 (executing program) 2021/02/07 07:13:58 fetching corpus: 37150, signal 791130/845899 (executing program) 2021/02/07 07:13:58 fetching corpus: 37200, signal 791305/845899 (executing program) 2021/02/07 07:13:59 fetching corpus: 37250, signal 791531/845899 (executing program) 2021/02/07 07:13:59 fetching corpus: 37300, signal 791796/845899 (executing program) 2021/02/07 07:13:59 fetching corpus: 37350, signal 792072/845899 (executing program) 2021/02/07 07:13:59 fetching corpus: 37400, signal 792346/845899 (executing program) 2021/02/07 07:13:59 fetching corpus: 37450, signal 792771/845899 (executing program) 2021/02/07 07:13:59 fetching corpus: 37500, signal 793068/845899 (executing program) 2021/02/07 07:14:00 fetching corpus: 37550, signal 793344/845899 (executing program) 2021/02/07 07:14:00 fetching corpus: 37600, signal 793558/845900 (executing program) 2021/02/07 07:14:00 fetching corpus: 37650, signal 793779/845900 (executing program) 2021/02/07 07:14:00 fetching corpus: 37700, signal 794044/845900 (executing program) 2021/02/07 07:14:00 fetching corpus: 37750, signal 794306/845900 (executing program) 2021/02/07 07:14:00 fetching corpus: 37800, signal 794477/845900 (executing program) 2021/02/07 07:14:00 fetching corpus: 37850, signal 794774/845900 (executing program) 2021/02/07 07:14:00 fetching corpus: 37900, signal 794994/845901 (executing program) 2021/02/07 07:14:01 fetching corpus: 37950, signal 795330/845901 (executing program) 2021/02/07 07:14:01 fetching corpus: 38000, signal 795562/845901 (executing program) 2021/02/07 07:14:01 fetching corpus: 38050, signal 795776/845901 (executing program) 2021/02/07 07:14:01 fetching corpus: 38100, signal 796031/845901 (executing program) 2021/02/07 07:14:01 fetching corpus: 38150, signal 796293/845901 (executing program) 2021/02/07 07:14:01 fetching corpus: 38200, signal 796561/845901 (executing program) 2021/02/07 07:14:01 fetching corpus: 38250, signal 796782/845901 (executing program) 2021/02/07 07:14:01 fetching corpus: 38300, signal 797000/845901 (executing program) 2021/02/07 07:14:02 fetching corpus: 38350, signal 797277/845901 (executing program) 2021/02/07 07:14:02 fetching corpus: 38400, signal 797526/845901 (executing program) 2021/02/07 07:14:02 fetching corpus: 38450, signal 797680/845901 (executing program) 2021/02/07 07:14:02 fetching corpus: 38500, signal 797843/845901 (executing program) 2021/02/07 07:14:02 fetching corpus: 38550, signal 798023/845902 (executing program) 2021/02/07 07:14:02 fetching corpus: 38600, signal 798245/845902 (executing program) 2021/02/07 07:14:02 fetching corpus: 38650, signal 798451/845902 (executing program) 2021/02/07 07:14:02 fetching corpus: 38700, signal 798672/845902 (executing program) 2021/02/07 07:14:03 fetching corpus: 38750, signal 798924/845902 (executing program) 2021/02/07 07:14:03 fetching corpus: 38800, signal 799183/845902 (executing program) 2021/02/07 07:14:03 fetching corpus: 38850, signal 799438/845903 (executing program) 2021/02/07 07:14:03 fetching corpus: 38900, signal 799794/845904 (executing program) 2021/02/07 07:14:03 fetching corpus: 38950, signal 800058/845904 (executing program) 2021/02/07 07:14:03 fetching corpus: 39000, signal 800232/845904 (executing program) 2021/02/07 07:14:03 fetching corpus: 39050, signal 800477/845904 (executing program) 2021/02/07 07:14:03 fetching corpus: 39100, signal 800707/845905 (executing program) 2021/02/07 07:14:03 fetching corpus: 39150, signal 800912/845905 (executing program) 2021/02/07 07:14:04 fetching corpus: 39200, signal 801093/845906 (executing program) 2021/02/07 07:14:04 fetching corpus: 39250, signal 801316/845906 (executing program) 2021/02/07 07:14:04 fetching corpus: 39300, signal 801518/845906 (executing program) 2021/02/07 07:14:04 fetching corpus: 39350, signal 801741/845906 (executing program) 2021/02/07 07:14:04 fetching corpus: 39400, signal 801987/845906 (executing program) 2021/02/07 07:14:04 fetching corpus: 39450, signal 802178/845906 (executing program) 2021/02/07 07:14:05 fetching corpus: 39500, signal 802460/845906 (executing program) 2021/02/07 07:14:05 fetching corpus: 39550, signal 802601/845906 (executing program) 2021/02/07 07:14:05 fetching corpus: 39600, signal 802861/845907 (executing program) 2021/02/07 07:14:05 fetching corpus: 39650, signal 803057/845907 (executing program) 2021/02/07 07:14:05 fetching corpus: 39700, signal 803241/845907 (executing program) 2021/02/07 07:14:05 fetching corpus: 39750, signal 803438/845907 (executing program) 2021/02/07 07:14:05 fetching corpus: 39800, signal 803578/845907 (executing program) 2021/02/07 07:14:05 fetching corpus: 39850, signal 803854/845907 (executing program) 2021/02/07 07:14:05 fetching corpus: 39900, signal 804050/845907 (executing program) 2021/02/07 07:14:06 fetching corpus: 39950, signal 804244/845907 (executing program) 2021/02/07 07:14:06 fetching corpus: 40000, signal 804494/845908 (executing program) 2021/02/07 07:14:06 fetching corpus: 40050, signal 804752/845908 (executing program) 2021/02/07 07:14:06 fetching corpus: 40100, signal 804884/845908 (executing program) 2021/02/07 07:14:06 fetching corpus: 40150, signal 805059/845908 (executing program) 2021/02/07 07:14:06 fetching corpus: 40200, signal 805356/845908 (executing program) 2021/02/07 07:14:06 fetching corpus: 40250, signal 805573/845908 (executing program) 2021/02/07 07:14:06 fetching corpus: 40300, signal 805919/845908 (executing program) 2021/02/07 07:14:07 fetching corpus: 40350, signal 806108/845908 (executing program) 2021/02/07 07:14:07 fetching corpus: 40400, signal 806274/845908 (executing program) 2021/02/07 07:14:07 fetching corpus: 40450, signal 806523/845912 (executing program) 2021/02/07 07:14:07 fetching corpus: 40500, signal 806759/845915 (executing program) 2021/02/07 07:14:07 fetching corpus: 40550, signal 806993/845915 (executing program) 2021/02/07 07:14:07 fetching corpus: 40600, signal 807192/845916 (executing program) 2021/02/07 07:14:07 fetching corpus: 40650, signal 807358/845916 (executing program) 2021/02/07 07:14:07 fetching corpus: 40700, signal 807564/845916 (executing program) 2021/02/07 07:14:07 fetching corpus: 40750, signal 807785/845916 (executing program) 2021/02/07 07:14:08 fetching corpus: 40800, signal 808000/845916 (executing program) 2021/02/07 07:14:08 fetching corpus: 40850, signal 808200/845916 (executing program) 2021/02/07 07:14:08 fetching corpus: 40900, signal 808469/845916 (executing program) 2021/02/07 07:14:08 fetching corpus: 40950, signal 808823/845916 (executing program) 2021/02/07 07:14:08 fetching corpus: 41000, signal 809052/845916 (executing program) 2021/02/07 07:14:08 fetching corpus: 41050, signal 809263/845916 (executing program) 2021/02/07 07:14:08 fetching corpus: 41100, signal 809559/845916 (executing program) 2021/02/07 07:14:08 fetching corpus: 41150, signal 809728/845916 (executing program) 2021/02/07 07:14:08 fetching corpus: 41200, signal 809977/845916 (executing program) 2021/02/07 07:14:09 fetching corpus: 41250, signal 810223/845916 (executing program) 2021/02/07 07:14:09 fetching corpus: 41300, signal 810482/845916 (executing program) 2021/02/07 07:14:09 fetching corpus: 41350, signal 810700/845916 (executing program) 2021/02/07 07:14:09 fetching corpus: 41400, signal 810854/845916 (executing program) 2021/02/07 07:14:09 fetching corpus: 41450, signal 811043/845925 (executing program) 2021/02/07 07:14:09 fetching corpus: 41500, signal 811285/845925 (executing program) 2021/02/07 07:14:09 fetching corpus: 41550, signal 811545/845927 (executing program) 2021/02/07 07:14:10 fetching corpus: 41600, signal 811879/845927 (executing program) 2021/02/07 07:14:10 fetching corpus: 41650, signal 812075/845927 (executing program) 2021/02/07 07:14:10 fetching corpus: 41700, signal 812262/845927 (executing program) 2021/02/07 07:14:10 fetching corpus: 41750, signal 812430/845927 (executing program) 2021/02/07 07:14:10 fetching corpus: 41800, signal 812750/845927 (executing program) 2021/02/07 07:14:10 fetching corpus: 41850, signal 812890/845927 (executing program) 2021/02/07 07:14:10 fetching corpus: 41900, signal 813084/845927 (executing program) 2021/02/07 07:14:10 fetching corpus: 41950, signal 813346/845927 (executing program) 2021/02/07 07:14:11 fetching corpus: 42000, signal 813534/845927 (executing program) 2021/02/07 07:14:11 fetching corpus: 42050, signal 813749/845927 (executing program) 2021/02/07 07:14:11 fetching corpus: 42100, signal 814020/845927 (executing program) 2021/02/07 07:14:11 fetching corpus: 42150, signal 814209/845927 (executing program) 2021/02/07 07:14:11 fetching corpus: 42200, signal 814392/845927 (executing program) 2021/02/07 07:14:11 fetching corpus: 42250, signal 814601/845929 (executing program) 2021/02/07 07:14:11 fetching corpus: 42300, signal 814760/845929 (executing program) 2021/02/07 07:14:11 fetching corpus: 42350, signal 815072/845929 (executing program) 2021/02/07 07:14:11 fetching corpus: 42400, signal 815390/845929 (executing program) 2021/02/07 07:14:12 fetching corpus: 42450, signal 815655/845929 (executing program) 2021/02/07 07:14:12 fetching corpus: 42500, signal 815900/845930 (executing program) 2021/02/07 07:14:12 fetching corpus: 42550, signal 816175/845930 (executing program) 2021/02/07 07:14:12 fetching corpus: 42600, signal 816372/845930 (executing program) 2021/02/07 07:14:12 fetching corpus: 42650, signal 816568/845930 (executing program) 2021/02/07 07:14:12 fetching corpus: 42700, signal 816798/845932 (executing program) 2021/02/07 07:14:12 fetching corpus: 42750, signal 817048/845932 (executing program) 2021/02/07 07:14:12 fetching corpus: 42800, signal 817244/845932 (executing program) 2021/02/07 07:14:12 fetching corpus: 42808, signal 817279/845932 (executing program) 2021/02/07 07:14:12 fetching corpus: 42808, signal 817279/845932 (executing program) 2021/02/07 07:14:14 starting 6 fuzzer processes 07:14:14 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000080)) 07:14:15 executing program 1: openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttynull\x00', 0x10000, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 07:14:15 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r2, &(0x7f0000000100)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6c, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000140)={r4, 0x1, '@'}, &(0x7f00000002c0)=0x9) 07:14:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) 07:14:15 executing program 4: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) write$sysctl(r0, &(0x7f00000000c0)='4\x00', 0x2) 07:14:16 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) syzkaller login: [ 179.793147][ T8416] IPVS: ftp: loaded support on port[0] = 21 [ 179.971806][ T8418] IPVS: ftp: loaded support on port[0] = 21 [ 180.163775][ T8416] chnl_net:caif_netlink_parms(): no params data found [ 180.274207][ T8420] IPVS: ftp: loaded support on port[0] = 21 [ 180.292957][ T8418] chnl_net:caif_netlink_parms(): no params data found [ 180.454323][ T8422] IPVS: ftp: loaded support on port[0] = 21 [ 180.501537][ T8416] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.524073][ T8416] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.534741][ T8416] device bridge_slave_0 entered promiscuous mode [ 180.554567][ T8418] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.562926][ T8418] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.575292][ T8418] device bridge_slave_0 entered promiscuous mode [ 180.598092][ T8416] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.605741][ T8416] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.613766][ T8416] device bridge_slave_1 entered promiscuous mode [ 180.623280][ T8418] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.630686][ T8418] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.642875][ T8418] device bridge_slave_1 entered promiscuous mode [ 180.807070][ T8416] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.842391][ T8416] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.862069][ T8418] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.881478][ T8424] IPVS: ftp: loaded support on port[0] = 21 [ 180.900027][ T8420] chnl_net:caif_netlink_parms(): no params data found [ 180.915588][ T8418] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.932448][ T8416] team0: Port device team_slave_0 added [ 180.958123][ T8416] team0: Port device team_slave_1 added [ 180.994367][ T8418] team0: Port device team_slave_0 added [ 181.040962][ T8418] team0: Port device team_slave_1 added [ 181.139403][ T8462] IPVS: ftp: loaded support on port[0] = 21 [ 181.167887][ T8416] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 181.174851][ T8416] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.202580][ T8416] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 181.242530][ T8420] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.250361][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.259085][ T8420] device bridge_slave_0 entered promiscuous mode [ 181.294191][ T8416] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 181.301382][ T8416] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.327866][ T8416] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 181.352303][ T8420] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.360129][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.369976][ T8420] device bridge_slave_1 entered promiscuous mode [ 181.392291][ T8422] chnl_net:caif_netlink_parms(): no params data found [ 181.410791][ T8418] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 181.419713][ T8418] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.446971][ T8418] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 181.489552][ T8416] device hsr_slave_0 entered promiscuous mode [ 181.499303][ T8416] device hsr_slave_1 entered promiscuous mode [ 181.517734][ T8420] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 181.529952][ T8420] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 181.539873][ T8418] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 181.547173][ T8418] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.574149][ T8418] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 181.679771][ T8420] team0: Port device team_slave_0 added [ 181.737746][ T8420] team0: Port device team_slave_1 added [ 181.739913][ T2943] Bluetooth: hci0: command 0x0409 tx timeout [ 181.752521][ T8418] device hsr_slave_0 entered promiscuous mode [ 181.762261][ T8418] device hsr_slave_1 entered promiscuous mode [ 181.769347][ T8418] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 181.777405][ T8418] Cannot create hsr debugfs directory [ 181.907940][ T8420] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 181.914932][ T8420] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.942077][ T8420] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 181.959035][ T8420] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 181.966025][ T8420] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.992119][ T5] Bluetooth: hci1: command 0x0409 tx timeout [ 181.993889][ T8420] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 182.010464][ T8424] chnl_net:caif_netlink_parms(): no params data found [ 182.037615][ T8422] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.044872][ T8422] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.060823][ T8422] device bridge_slave_0 entered promiscuous mode [ 182.072186][ T8422] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.080361][ T8422] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.089879][ T8422] device bridge_slave_1 entered promiscuous mode [ 182.150806][ T8422] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 182.188810][ T8422] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.198397][ T8462] chnl_net:caif_netlink_parms(): no params data found [ 182.213671][ T8420] device hsr_slave_0 entered promiscuous mode [ 182.221100][ T19] Bluetooth: hci2: command 0x0409 tx timeout [ 182.229793][ T8420] device hsr_slave_1 entered promiscuous mode [ 182.236949][ T8420] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 182.244501][ T8420] Cannot create hsr debugfs directory [ 182.319966][ T8422] team0: Port device team_slave_0 added [ 182.368790][ T8422] team0: Port device team_slave_1 added [ 182.455259][ T5] Bluetooth: hci3: command 0x0409 tx timeout [ 182.476420][ T8424] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.483508][ T8424] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.496049][ T8424] device bridge_slave_0 entered promiscuous mode [ 182.528349][ T8422] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 182.541373][ T8422] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 182.567745][ T8422] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 182.584666][ T8424] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.593082][ T8424] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.602076][ T8424] device bridge_slave_1 entered promiscuous mode [ 182.622989][ T8422] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 182.635037][ T8422] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 182.664110][ T8422] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 182.700495][ T8416] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 182.707636][ T8746] Bluetooth: hci4: command 0x0409 tx timeout [ 182.741285][ T8424] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 182.762373][ T8424] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.780436][ T8416] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 182.793511][ T8422] device hsr_slave_0 entered promiscuous mode [ 182.805066][ T8422] device hsr_slave_1 entered promiscuous mode [ 182.812060][ T8422] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 182.820827][ T8422] Cannot create hsr debugfs directory [ 182.835303][ T8462] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.842444][ T8462] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.850438][ T8462] device bridge_slave_0 entered promiscuous mode [ 182.864807][ T8462] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.873409][ T8462] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.881539][ T8462] device bridge_slave_1 entered promiscuous mode [ 182.889370][ T8416] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 182.900068][ T8416] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 182.940033][ T8424] team0: Port device team_slave_0 added [ 182.954859][ T8424] team0: Port device team_slave_1 added [ 182.986305][ T8462] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.012135][ T8418] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 183.037524][ T8462] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.081124][ T8418] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 183.096819][ T9505] Bluetooth: hci5: command 0x0409 tx timeout [ 183.117894][ T8424] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 183.124920][ T8424] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.151868][ T8424] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 183.174188][ T8424] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 183.181847][ T8424] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.208363][ T8424] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 183.219791][ T8418] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 183.233190][ T8418] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 183.296300][ T8462] team0: Port device team_slave_0 added [ 183.337391][ T8462] team0: Port device team_slave_1 added [ 183.354586][ T8420] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 183.378402][ T8424] device hsr_slave_0 entered promiscuous mode [ 183.388770][ T8424] device hsr_slave_1 entered promiscuous mode [ 183.395405][ T8424] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 183.402993][ T8424] Cannot create hsr debugfs directory [ 183.444348][ T8420] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 183.478759][ T8420] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 183.492672][ T8420] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 183.513933][ T8462] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 183.525451][ T8462] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.557797][ T8462] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 183.571375][ T8462] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 183.579424][ T8462] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.605901][ T8462] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 183.719957][ T8462] device hsr_slave_0 entered promiscuous mode [ 183.729071][ T8462] device hsr_slave_1 entered promiscuous mode [ 183.737093][ T8462] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 183.744799][ T8462] Cannot create hsr debugfs directory [ 183.773237][ T8422] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 183.819355][ T8422] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 183.827277][ T9505] Bluetooth: hci0: command 0x041b tx timeout [ 183.863817][ T8416] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.873780][ T8422] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 183.889309][ T8422] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 183.959875][ T8416] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.008186][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.021507][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.055350][ T9696] Bluetooth: hci1: command 0x041b tx timeout [ 184.067494][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.081675][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.091628][ T2940] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.098993][ T2940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.109427][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.118625][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.127671][ T2940] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.134720][ T2940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.147719][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.180070][ T8418] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.224320][ T8424] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 184.245819][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.254657][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.271973][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.281612][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.292526][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.302624][ T9633] Bluetooth: hci2: command 0x041b tx timeout [ 184.322282][ T8424] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 184.334164][ T8424] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 184.353132][ T8420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.361694][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.372916][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.383004][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.392387][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.401734][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.410267][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.421283][ T8418] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.430214][ T8424] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 184.482936][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.494148][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.505747][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.516299][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.524586][ T9633] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.531687][ T9633] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.540419][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.549278][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.557882][ T9633] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.564930][ T9633] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.573252][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.581348][ T9633] Bluetooth: hci3: command 0x041b tx timeout [ 184.603771][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.623997][ T8420] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.640809][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.650202][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.658789][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.681927][ T8462] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 184.691288][ T8462] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 184.714148][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.743219][ T8462] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 184.755287][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.764394][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.773364][ T8746] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.780536][ T8746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.789908][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.798457][ T8746] Bluetooth: hci4: command 0x041b tx timeout [ 184.820497][ T8462] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 184.847781][ T9595] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.856225][ T9595] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.863701][ T9595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.874171][ T9595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.883487][ T9595] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.890600][ T9595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.898689][ T9595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.907905][ T9595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.916974][ T9595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.927370][ T9595] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.944796][ T8416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.991756][ T8422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.014104][ T8422] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.023645][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.033479][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.042478][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.051472][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.062505][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.070706][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.094821][ T8418] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 185.110423][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.138092][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.146855][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.155660][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.164816][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.174298][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.183971][ T9505] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.185351][ T9728] Bluetooth: hci5: command 0x041b tx timeout [ 185.191104][ T9505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.205854][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.214320][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.223390][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.232670][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.241622][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.250800][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.260260][ T9505] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.267409][ T9505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.286398][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.294330][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.314531][ T8420] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 185.327025][ T8420] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 185.357037][ T8424] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.391817][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.400554][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.414829][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.424384][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.433131][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 185.442501][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.451920][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.460458][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.482349][ T8418] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.519724][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.527690][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.537404][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.548504][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.556463][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.564875][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.574592][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.583780][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.593064][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.601913][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.619915][ T8416] device veth0_vlan entered promiscuous mode [ 185.634512][ T8424] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.653070][ T9728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 185.662100][ T9728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.672518][ T9728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.681826][ T9728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.691890][ T9728] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.700392][ T9728] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.724662][ T8422] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 185.738973][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.753527][ T8462] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.764823][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.774651][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.783596][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 185.793042][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.802325][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.811580][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.821215][ T8746] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.828371][ T8746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.837992][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.868046][ T8416] device veth1_vlan entered promiscuous mode [ 185.888583][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 185.900726][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.912375][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.920943][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.928256][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.937215][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.947260][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.954662][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.962779][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.971024][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.989792][ T19] Bluetooth: hci0: command 0x040f tx timeout [ 185.991599][ T8462] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.024587][ T8422] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.048862][ T8420] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.060936][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 186.071656][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.080744][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.089417][ T8746] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.096567][ T8746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.115428][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.123120][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.136036][ T8976] Bluetooth: hci1: command 0x040f tx timeout [ 186.145731][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.154043][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.172583][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.182028][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.191400][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.201844][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.210380][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.219576][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.228057][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.243155][ T8418] device veth0_vlan entered promiscuous mode [ 186.277430][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.288140][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.300101][ T2940] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.307252][ T2940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.314957][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.327740][ T8418] device veth1_vlan entered promiscuous mode [ 186.377319][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 186.377929][ T9505] Bluetooth: hci2: command 0x040f tx timeout [ 186.388614][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 186.400833][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 186.411231][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.420305][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.429428][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.438143][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.447264][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 186.456918][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 186.465507][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.473784][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.482324][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 186.491372][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.508349][ T8416] device veth0_macvtap entered promiscuous mode [ 186.534568][ T8424] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 186.556494][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.573058][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.582220][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.596630][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.604756][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.618901][ T9505] Bluetooth: hci3: command 0x040f tx timeout [ 186.653795][ T8422] device veth0_vlan entered promiscuous mode [ 186.666592][ T8416] device veth1_macvtap entered promiscuous mode [ 186.684074][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.693528][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.703673][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.716426][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.752740][ T8422] device veth1_vlan entered promiscuous mode [ 186.769930][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.780505][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.789866][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 186.798927][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.808445][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.817692][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 186.827489][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 186.837225][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.846690][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.854878][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.855735][ T9505] Bluetooth: hci4: command 0x040f tx timeout [ 186.866619][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.882819][ T8462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.893942][ T8418] device veth0_macvtap entered promiscuous mode [ 186.913875][ T8418] device veth1_macvtap entered promiscuous mode [ 186.922605][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 186.932732][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 186.942323][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 186.950739][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.959445][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.968101][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.976214][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.987048][ T8420] device veth0_vlan entered promiscuous mode [ 187.007011][ T8416] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 187.032843][ T8420] device veth1_vlan entered promiscuous mode [ 187.041705][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 187.050985][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 187.060163][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.074420][ T8416] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 187.089351][ T8424] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.116549][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 187.124577][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 187.140933][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 187.150736][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.159915][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.172023][ T8416] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 187.187872][ T8416] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 187.200685][ T8416] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 187.211588][ T8416] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 187.239325][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.250246][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.260604][ T9596] Bluetooth: hci5: command 0x040f tx timeout [ 187.264028][ T8418] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 187.281940][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.293164][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.306153][ T8418] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 187.313501][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.323252][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.332941][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 187.343233][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.352556][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 187.361599][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 187.372646][ T8422] device veth0_macvtap entered promiscuous mode [ 187.391789][ T8462] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.403882][ T8418] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 187.419246][ T8418] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 187.440885][ T8418] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 187.450184][ T8418] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 187.479078][ T8422] device veth1_macvtap entered promiscuous mode [ 187.515766][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 187.532719][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.564331][ T8420] device veth0_macvtap entered promiscuous mode [ 187.609311][ T8420] device veth1_macvtap entered promiscuous mode [ 187.634883][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.651200][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.661394][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.683417][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.696869][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.707639][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.718627][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.731200][ T8422] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 187.796232][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 187.816836][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 187.828567][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.842216][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 187.868283][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 187.931655][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.942188][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.954719][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.965764][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.977652][ T8422] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 188.045938][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 188.054607][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 188.070647][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 188.079359][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.092418][ T2940] Bluetooth: hci0: command 0x0419 tx timeout [ 188.096035][ T8422] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.107574][ T8422] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.116791][ T8422] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.125663][ T8422] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.149776][ T283] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 188.153370][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.164955][ T283] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 188.198069][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.208259][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.219612][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.230155][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.230625][ T19] Bluetooth: hci1: command 0x0419 tx timeout [ 188.241348][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.258545][ T8420] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 188.271054][ T8424] device veth0_vlan entered promiscuous mode [ 188.282432][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.291391][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.302099][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 188.310234][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 188.319232][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 188.346819][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.363768][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.376597][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.388385][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.398696][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.409782][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.421802][ T8420] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 188.466448][ T9730] Bluetooth: hci2: command 0x0419 tx timeout [ 188.480492][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 188.490372][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 188.499843][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 188.509660][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.522070][ T8420] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.533174][ T8420] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.542811][ T8420] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.552035][ T8420] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.574630][ T8424] device veth1_vlan entered promiscuous mode [ 188.602941][ T8462] device veth0_vlan entered promiscuous mode [ 188.609651][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 188.621169][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 188.631015][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.642069][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.650356][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.659315][ T367] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 188.690735][ T49] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 188.705210][ T2940] Bluetooth: hci3: command 0x0419 tx timeout [ 188.722974][ T367] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 188.730709][ T49] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 188.742603][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 188.775950][ T8462] device veth1_vlan entered promiscuous mode [ 188.815419][ T9505] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 188.878939][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 188.889467][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 188.926110][ T8424] device veth0_macvtap entered promiscuous mode [ 188.935938][ T9595] Bluetooth: hci4: command 0x0419 tx timeout [ 188.966011][ T216] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 188.974076][ T216] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 189.005779][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 189.014095][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 189.047178][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.072883][ T8424] device veth1_macvtap entered promiscuous mode 07:14:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00'}) [ 189.099497][ T8462] device veth0_macvtap entered promiscuous mode [ 189.138751][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.170838][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 189.196484][ T2943] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 189.211602][ T8462] device veth1_macvtap entered promiscuous mode [ 189.262843][ T49] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 189.270458][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.284010][ T49] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 07:14:25 executing program 0: add_key$user(&(0x7f0000000600)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) [ 189.309280][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.330617][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.345773][ T9595] Bluetooth: hci5: command 0x0419 tx timeout [ 189.346701][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.392862][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.405172][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.416937][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.429377][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.449397][ T8424] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 189.482833][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.508850][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 189.524606][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 189.542930][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 07:14:26 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f00000018c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 189.574181][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.576893][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 189.593182][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.654647][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 189.669131][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.690151][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.704614][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.715869][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.726311][ T8424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.740036][ T8424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:14:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, &(0x7f0000002640)=0x80) ioctl$SIOCSIFMTU(r1, 0x8922, 0x0) [ 189.785291][ T8424] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 189.810359][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.845588][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.860328][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 07:14:26 executing program 1: mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x4088030, 0xffffffffffffffff, 0x0) [ 189.911240][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.938881][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.954040][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.972768][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.999864][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.010256][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 190.021589][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.034270][ T8462] batman_adv: batadv0: Interface activated: batadv_slave_0 07:14:26 executing program 0: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000140)='disconnect aa:aa:aa:aa:aa:11 2', 0x1e) [ 190.059109][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 190.075759][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 190.092829][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 07:14:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x4f9000) [ 190.117083][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 190.131700][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 190.163632][ T8424] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.186437][ T8424] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.202755][ T8424] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.225584][ T8424] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.262413][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 07:14:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty, 0x0, 0x0, 0x5, 0x10000}}) [ 190.287889][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.313636][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 190.333222][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.344412][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 190.363743][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.385188][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 190.411307][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.432921][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 190.446027][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.459223][ T8462] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 190.479729][ T24] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 190.491161][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 190.503347][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 190.514531][ T24] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 190.540897][ T216] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 190.554323][ T216] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 190.575336][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 190.610747][ T8462] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.635024][ T8462] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.656363][ T8462] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.670274][ T8462] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.719242][ T9595] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 190.889270][ T9864] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 191.022682][ T9864] device syzkaller1 entered promiscuous mode 07:14:27 executing program 1: syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x60802) [ 191.434238][ T367] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 191.464920][ T367] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 191.498413][ T49] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 191.521783][ T49] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 191.572449][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 191.596401][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 191.617018][ T24] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 191.642887][ T24] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 191.651292][ T49] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 191.682147][ T49] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 07:14:28 executing program 3: r0 = io_uring_setup(0x4b6f, &(0x7f0000000000)={0x0, 0x65d0}) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) [ 191.702791][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 191.728766][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 07:14:28 executing program 4: socketpair(0x0, 0x1, 0x1, &(0x7f0000003cc0)) 07:14:29 executing program 5: socketpair(0x18, 0x0, 0x8000, &(0x7f0000000000)) 07:14:29 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2002, 0x0, 0x0) 07:14:29 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r2, &(0x7f0000000100)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6c, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000140)={r4, 0x1, '@'}, &(0x7f00000002c0)=0x9) 07:14:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x18, 0x1, 0x7, 0x101, 0x0, 0x0, {}, [@NFACCT_FILTER={0x4}]}, 0x18}}, 0x0) 07:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002c80)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000002bc0)=""/175, 0x2d, 0xaf, 0x1}, 0x20) 07:14:29 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000040)=@raw=[@call, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}], &(0x7f0000000080)='GPL\x00', 0x4, 0xb5, &(0x7f00000000c0)=""/181, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x2}, 0x40) 07:14:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x47, 0x1}, 0x40) 07:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x7}}, &(0x7f0000000280)=""/200, 0x1a, 0xc8, 0x1}, 0x20) 07:14:29 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\a\x00@\x00\x00\x00\x00\x00\x05\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') 07:14:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/200, 0x1a, 0xc8, 0x1}, 0x20) [ 193.167771][ C0] hrtimer: interrupt took 69250 ns 07:14:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002600)={0x11, 0x3, &(0x7f00000014c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, &(0x7f0000001540)='GPL\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000000100)=""/175, 0x3e, 0xaf, 0x1}, 0x20) 07:14:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x0, 0x0, 0x0, 0xa42}, 0x40) 07:14:29 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000d40)=[{0x58, 0x0, 0x0, "4ffae681204a7f6d6d75b4e6e718abb1633aeecc998bce94d813a3f4cb2a7a391b6f6016b126edac79cb8f7d031845ba6456969c970667a3f3ec7dee00c20cbdbe"}, {0x1010, 0x0, 0x0, "66dc8981d85b7d34f87b2338ffcd713f0e17cba77fb4a01385c12e71b769ae96a63a42fefdaa3dba05503206c7245a8eacff5c0ce34a68117b4f8767ec8d6b83e6c120fe279ab09d91fdf3d98d6c57f86d78e6e9082a052a34157a474dbfbd9efce81dddc55846c03d3d19f826331599b764f70da54820c1540c9d399d24e7a3deb5447bc9b808a4f55c420b6beb87f574831e5dee87131c0cc189fb381892c5d5f876be5d1c5ebbdcc3a41a1ce37731cb503523e6bf530a83b6be757940430f64f8f5ecb9ccc2d9f0ad72760406710f25d7ea3b0bd1187fbb5dc35bfddcc1d86892ea4c59341119a5ee9f08424aab11ec4d1ac46488129f56c19fda1ab994202024c969fe23674dd714819da2bf79cc647edbb36cceb2df738f042afb1dc8a9aadd1456e93efcd139126e189eb09d73a04681466628a25c3707eea147c9578249336fbdb4df9358181105cb146f8af0369192bac7aeccdcdd1f14875ee276acf30523856f6d37890993b7f2a17ced4ffc51635702d61b094a27524f8d02e62b944e97e8b6b73cc98e9f8c393c7efa0589b6003cbc9d7c3eafed9b89ec8a3cdadce26bd4312ec8ea126041b53ea40d5b8592f74d292a5093cacde488081bc25bb1b387112d5ea46e9b202ee5b06032b74db18d36b14b33a7c7e39274e6dbeacb503211ea6430ce04d2610906ca8c47034e6b7f7ab47db80d1140f3469e743c473df4aca705b27c42ba5e0503145f098f06a14514e86b91dd02befb9a485323b3ba3118668100a6c583685a2fa53439380ac08e3a4396b7c760b616865e5915f4093dde87ae0a1b8eda2507b1ad0488aeeb1b17b51950b8406139668fc79416f0ccbf136b1544e3c45701581354d02284c4beaca2390f81bd4a38046f5b501394893f4f61014090205a7c2e1973e790932bf15b7a331ec9b718160779c7a701e0c6a9b528d76c3b0d3ca3c728f54483a952c3cb74ff3759fdff8ca88e74fb430943a270bca570ea8dd1e4c50bbc1db579bfa9c02d594d20f87a385acc0a9804106c912c57efb9ef28040aeffe5f6ed05e4e6e90ff71784cdbc55b5d411e5c521dfcc529dd96123995d0b65b0f2915a507977317926658bdfff879d37e43576f6d87fb8efee1ab45818a743400a1b963488aa46c23379a7f622346c3580c660ca2caf40ce76f54af5db6ffbf59d0096b024224014310c0a9725079ff226a4225a8d2b58416d8819e9055e3d6094f41617a6fa8727f39c82457535c2b54301d7acc62d81495e136e0bacfb851a31ff9c3b4db0a85b589a49dc727481d75e3cb6adac69aaf0f59c676e2c91de11ce95298377259647cd6a349182d502a260b6bf076ae76483be136c06391b77e490b624a3f5ba7fa7393c07a34b42334520da2484ac7579177e49516af970671964a049d8dc76dcee9f56cf89e169f93dc899b48ad41ba43c12d3a625f3c07109be62cb8d7aff3135307e6a60462b53e632beb7057ba1e8545f10ac75820265f84de750ebc1f15323f4a14520d641de81bdb8b85b37b9b8fd153069f52c42c4d8de5536a5b0d4a6ec1652861c19da9465dcd0d50a9f6eecb06f58c0364d0557d138173d22b4a17ca6d82695ea04e507d1f5c72f41bac870ef480e08ea7bfae8cd0896a56848cf113582b98fd4170e63faffc35eecdf1ba9234c0a53277ec2ffacb7a6b7956f5de50c8601207d81c30ada9b0ff4265f785c47ac1ba68a01985637ff62df0b4355b19824b62f40a9b9526da991ef6d47eaa08fcb423e1d4b1e23da83a9e36743c23d1c495ae4d2ec59f80393e4ce564377d95a55530793442ddc788200c459b700d2e42f9873762ebe59685962936fb7a20b0b8c4f17377e828c0fa81e16530017b4bde92110241907bf2691ce3867b4e4c6d22f8393d5717541c4889acead4220b9b014aa0e265ad216e6bea37706721372705d39fbe3278f8b970737315e81c0e81325fb38cfbdda4d3c06bf0e15927d816ac18c7ebe91483511ed9c0bb7ec018aa468eff42b2ee83079837960c207898d983addbf6b441303f0fb9683730f1f2fda2f46a1782f0ec51650d9f144c0c7af5294afea35dbcf339fcea117ab20d6905fd42e512bcfd44da949d70f9538d4af1fab92b1cc4c3ed3946d45dd2d1df046092a051eb091dce582073a478fc0eeb322b8b0c91164ca7bb698bd68457bd9bf96c499f49a7856c04d2f41183f311b9480f79b9eac8196a2ea1e7e16991a2749443793e26289b1c7bce9dca2c2d8792f23074a9c19a4802113d6eba704ee81c35628ef0d853f6ab30a5e4d2592b8e65cdc83cadff1f6cbebd5498a20e205b348a2feb7aa321e8b75ce55ce3cbcf06a253723d260bad223d28b23679ad006f5a1860c16bd44f06fd9e2caa5e73361a4feafe4d2d5106de3b11ececa2f2196be7593fac0f9d935e888d0d1d0a112e1fbdf9f32ff7cee8d86e00d3d9dfcb5f64d7e77793a99ff1ad3912966edf2d263a1c5d85ddd18cd16b891563fef3f58544a1a21d93b66d8daa029d367cc32ac38b71382038d3c8d838179ad38cedfb6ddb5fb3923d93e4ad46fa516c68ce3b7bdd8115ba26b140622de9ecfa00e5c6b84e2a3c93716dc4865e4045c8bfddb5e73cab7048675a12d70bd8c4b56cd33e6850595787dfc1d7863ac83b4f89531ea7cb7dc28b9308251a31be3451b1296dca39bca8c750730fea040243547ecf9e88410bed4f215ff28c49a9b1ddc6c114cc4b5180e6843f689b2815a64596bcf5fb4ddc7c119afec2eba3224628d994329642b550349e2f92ff284da7fb245d09135093ec2dde6a41168c17f8018132f22e3ca0ef58a6bbf3ac8cac2e6bc4ba39f2387a83003e7e92b475fe58ec562a5eed3ee563ec8520837a5572224cf90b146d1e1e244ff8896baebdea12579eb3f31bb588132d8a5056b9c48a7da872a13907e8d088fe91e0f0a1a080f73c7ee28049e5e27f58a0386d3da7077e8a6bf93954023f25f5bf8e3188739887192592af94ec9c3e119a526430a663f8385ae5d04d538284e29470d8242ef532c7260eabdb43c5e90c2adcafab8735912962341d7e8381cc21813a3c295532a42b35e76041fdd54f678d47878da8c4774fa7f2ee9c5f3d81f58f46dab09d3a5215ff060bdd18823f0a027252b996d4c82bfa33c0c1fb107e8ce19e4effbee6a23f9e337e6448dbc2d8a8818b2acde8fc54e44c02f9d090132c7fb16915e9b55f64e571bba84c50da456c12ce99b2142b034aca61783d29e3b019d72662b6665f0feeeb258055785dd15e961dc9364bf72f61afe112d8ae7b422559382e28c55d56873d009ddecf471ba731d29edbb316661bac08bb6543675c292c0ad8c7bc6a7c7d607e7ef5a45cb8ac2c1bdc8b10cf03dc4f553a0524bd76e4632a9c48403785255653acac0715c275791d1f1e7f629a956289885d587f0fbd6a3fdc957330910e28ed6ca9bf153e8e45c09b6a9afa6408eacf9dec6e1eb7c2a01f93656d7ae422e55b3ef6b6c560b767cd1479d989dc691eaed65adb0dd213278d8477cb25795467fdf97da3d7ce00f1895301013a200f3dbbbf70362ae4379a0ed4d37ec5c315f9194d4a5176986ce74c922b90faf521da6d0885c86175432ffe72bcf83c04987d60a42e8e5d82e0acd64faf5d62836cf8ff761341a53b3ba0aca9e02f4c796254de1eb3c80722fe1806c5da56312111c130391862d0869a39e5479c339f6c90799a47a0c82fed7caca75f4bea09638892ce9d9c1af4554117dbd9c69d676eb7d06a0bc3195248c63a1def27c5e9aa265e5d3b7d3405a7a3651abd9f16bbe07d16ab6e6bdcb01f482ba8e6e413fe9b8a487defacceb4d4ccc0ce3434f1b320f6b87fbb3a2b7fb80926d0c6f75ea5d5c9f332afc17b995ad18f8cfb0aaba0b0eb14f9f19b43e738afc2d314ba09f488ae72e6807b4ac559093d1ade85a62c70086f7eb995bf9eb82cbf27b7994bce6db60495798bcc4606de4697eacc7ea6fafc2cb7868ac4d363e796e8954684233638593e5bb4ac1a3f212fab9535519d01b6eb5c4751d61a4ebdc6ca7991dd8331c6644daeaec7f486d3682ef07a3abb1793cd6a7c89f2a73c9868d3975bc837e936f1f2d770847949c4a30e5dc5aaf9f84ead122315f9eb53ec5ee01225becdc91d99e343ba3f5b77a1ff6945b4851c70e727fc3c0bc550add87504f571b57cd78c85d111b2d339da4c53046fa34e8f7cfb09c6729409866001e89c594403f5906f4cf285e0f7a1641c34c318072ee3cb2b1da0dfb6d73d0fd3eeafab7b6c453612749d574a1b53a5a2ee9f6888ea9a03b19cde8f3f9088539fc9d98478800a355bd80c6b27b47760584b528d24142ff05212438b2f512dfd6eab5b10c4565b0f18aa0312619897e78b751a60606cfe789e3553bcff8c7b1b30aa82ad966f72ac3e72abcc7e7cba51e8cb9b9ef857a1992adfb198ff255f616d20fa5a80742fddf101d5f045eb67eb6c96da8f9098cdcf6796952065ce0759f59bf3bebb272e66f04d232665bb3426f39908c1417237301efcb7970bc1615a90a7c4449be6a72d321860149edb4bebe6bdbda02910210c5027cc71dae1c0b686f4b2505aadb1170ecaa6628d895ec877dcc163f6ac71ac60da57b69e333f689f3923ebdef0d8092a89581d13bc7ee075edac4fc1364dc24cbee30833fb3b9cd14ad5837b8686254b2e8c8a5df46454136dfd0d762ca000edda944696a76c8087291149ebcaeaf9e485c10407c9abfe8dfaa665bb65064623129c9e5649d046a95f8ad56954f4adea84b5ce06c4e584594b880853c3e07b1cbc2b408c1c34e610108235e9c6c4589dc0583d65452b3ea7050bc6d8266f2b0aa98760b4194f4f81552c2113b3ce0528a5f24acd800d2889a130280f5829e4524d9574fc7f09f2edbe139a9fc5a3fd946caa665e004835c2bf973e7e57fd3afa9d95ea074618e453b955196960fa58fd42fe3df6532b855a955278fa54a600c521edbb5b78dc4b2758efe721c4768f46441e11f5faaae168087ed870fa61c03126c663e2646a565679e21d043d0eda481dcf95dc6dd588efd5ba79d20b03822e11a02193e454663cb0c642116bbc104ce05f753e370b89b54b421877cf961617846478db44d87eed3ca522d1019b19bac169e7baa9ee733549c812bf0457a649c914f55f8e18844e32d001885df93b53292753f4037d8d32629ea74919b7176ae04c888e93439ae90215cf1d333687d60dbce9f84c00dac49cb58c8d122c6d3a7c61f2d6489c3ed20b4ec79882056757fd1a13f1b7d1f1bd885d0bf2405ecedd4604aa8cbd61b655bc1918b3ad35ee3bd08ddbd56f31847b2e49e5b1373061ee9263640bfdad20204d530da028ba974ee8475376909fd0e42f1a315959f4958bfedb2ad357553b892c4c1abe172793d8913b643f2d4f501413190b2d26495f01158faa779d235c7ca22614268323114cd4732eaaf2accc42fe13bdef83181deba496fea87ea0abc2d93620094fd9c09f6fa178355a254d6c9a8b66591ec3e8d79ec99de2f546bfbe0bcd43994629a2d4d55371e9c4e22cf24b40462d295ee715e870bdfa618405b744ab8a7234139c9d2be553513992d0949068d1352479599972ac1232c993aa3a4e721fe082bf17f2f04a67b6bccdf5895b14a28b78fd2124823ea630259ee10240bd47d2b798fc8f36836af0b7fb09bb6083f13f22d83f98c33041f524bfb3d9a74f5c99803c5807e1dc30e4192537c251756366c90d0de4e45d44d37f838c8ff7cab9f6"}, {0xfa0, 0x0, 0x0, "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"}], 0x2008}, 0x0) 07:14:30 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000002600)) 07:14:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f00000003c0)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 193.974961][ T9596] Bluetooth: hci5: command 0x0405 tx timeout 07:14:30 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000004740)={0x0, 0x0, &(0x7f00000045c0)=[{0xffffffffffffffff}], 0x1}, 0x0) 07:14:30 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\a\x00@\x00\x00\x00\x00\x00\x05\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') 07:14:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002600)={0x11, 0x3, &(0x7f00000014c0)=ANY=[@ANYBLOB="1800000000000500000000000000000095"], &(0x7f0000001540)='GPL\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@fwd={0x1}]}, {0x0, [0x61]}}, &(0x7f00000003c0)=""/4096, 0x27, 0x1000, 0x1}, 0x20) 07:14:30 executing program 0: socketpair(0x22, 0x0, 0x2, &(0x7f0000000580)) 07:14:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:14:30 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)='F', 0x1}, {0x0}, {&(0x7f0000000340)="13", 0x1}], 0x3, &(0x7f0000000140)="6fa04d078bab3e09fdf878e6d2f3bd18fd7942e7a6936398e576e189e319309d5630b2d8b7", 0x25}, 0x40050) 07:14:30 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000004280)) 07:14:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000000280)=""/200, 0x2e, 0xc8, 0x1}, 0x20) 07:14:30 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\a\x00@\x00\x00\x00\x00\x00\x05\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') 07:14:30 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r0}) 07:14:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0xe, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f0000000080)='GPL\x00', 0x4, 0xb5, &(0x7f00000000c0)=""/181, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:31 executing program 0: r0 = getpid() r1 = perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r1, 0x0, 0x0, 0x0}, 0x30) 07:14:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0xdc00, &(0x7f0000000080)=@framed={{}, [@func]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0x9b, &(0x7f0000000140)=""/155, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000440)=""/221, 0x1a, 0xdd, 0x1}, 0x20) 07:14:31 executing program 1: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x20) 07:14:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002c80)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x8, [@var={0x4, 0x0, 0x0, 0xe, 0x5}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x65}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f0000002bc0)=""/175, 0x40, 0xaf, 0x1}, 0x20) 07:14:31 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)='F', 0x1}, {&(0x7f0000000240)="a6", 0x1}], 0x2, &(0x7f0000000140)="6fa04d078bab3e09fdf878e6d2f3bd18fd7942e7a6936398e576e189e319309d5630b2d8b7", 0x25}, 0x40050) 07:14:31 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 07:14:31 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000840)={&(0x7f00000007c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x80, 0x0}, 0x0) 07:14:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000140)="b3", 0x1}, {&(0x7f0000000080)='!', 0x1}], 0x2, &(0x7f0000000200)=[@ip_tos_int={{0x14}}, @ip_ttl={{0x14}}], 0x30}, 0x0) 07:14:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002c80)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x9, [@var={0x4, 0x0, 0x0, 0xe, 0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x30, 0x5f, 0x2e]}}, &(0x7f0000002bc0)=""/175, 0x31, 0xaf, 0x1}, 0x20) 07:14:31 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f00000008c0)='./file0\x00'}, 0x10) 07:14:31 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 07:14:31 executing program 3: perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:14:31 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x6, &(0x7f0000000000)=@framed={{}, [@btf_id, @exit]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x1000, &(0x7f00000003c0)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001600), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0xa8) 07:14:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1, 0x4}]}]}}, &(0x7f0000000280)=""/200, 0x2e, 0xc8, 0x1}, 0x20) 07:14:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1e, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:31 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002780)) 07:14:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0xf103, &(0x7f0000000080)=@framed={{}, [@func]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0x9b, &(0x7f0000000140)=""/155, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x2, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 07:14:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0xb}, {0xc, 0x3}]}]}}, &(0x7f0000000280)=""/200, 0x3e, 0xc8, 0x1}, 0x20) 07:14:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:14:31 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)='R', 0x1}], 0x1}, 0x2884) close(r0) 07:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000040)=""/210, 0x26, 0xd2, 0x1}, 0x20) 07:14:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x1, 0x90a}]}]}}, &(0x7f0000000080)=""/213, 0x32, 0xd5, 0x1}, 0x20) 07:14:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x5}]}]}}, &(0x7f0000000080)=""/213, 0x32, 0xd5, 0x1}, 0x20) 07:14:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'macvlan0\x00', @link_local}) 07:14:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003b00)={0x0, 0x0, 0x0}, 0x0) 07:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x1000000}]}}, &(0x7f0000000280)=""/200, 0x26, 0xc8, 0x1}, 0x20) 07:14:32 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 07:14:32 executing program 2: socketpair(0x11, 0x0, 0x0, &(0x7f0000000080)) 07:14:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000440)=""/221, 0x2e, 0xdd, 0x1}, 0x20) 07:14:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12902, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1046, 0x0, 0xfffffbfd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:14:32 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@llc, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x10}], 0x10}, 0x0) 07:14:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9}, 0x40) 07:14:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001980)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @link_local, 'vlan0\x00'}}, 0x80, 0x0, 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB="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"], 0x2d0}, 0x0) 07:14:32 executing program 3: perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:14:32 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000001c0)) 07:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000280)=""/200, 0x26, 0xc8, 0x1}, 0x20) 07:14:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/200, 0x2e, 0xc8, 0x1}, 0x20) 07:14:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x1}]}, {0x0, [0x2e]}}, &(0x7f0000000040)=""/210, 0x27, 0xd2, 0x1}, 0x20) 07:14:33 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002600)={0x11, 0x3, &(0x7f00000014c0)=@framed, &(0x7f0000001540)='GPL\x00', 0x6, 0x1000, &(0x7f0000001580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 07:14:33 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)='o', 0x1}, 0x0) 07:14:33 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x9, 0x2, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1b, 0x8, 0x0, 0x0, 0x0, 0x1}, 0x40) 07:14:33 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x3090c0, 0x0) 07:14:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 07:14:33 executing program 0: bpf$BPF_PROG_DETACH(0xc, 0x0, 0x0) 07:14:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:14:33 executing program 2: socketpair(0x2, 0x3, 0x0, &(0x7f0000000080)) 07:14:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:14:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1c, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001a000000000800001c0000001c"], &(0x7f0000000280)=""/200, 0x36, 0xc8, 0x1}, 0x20) 07:14:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000000c0)=ANY=[], &(0x7f0000000c40)=""/248, 0x4e, 0xf8, 0x8}, 0x20) 07:14:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x1}]}, {0x0, [0x5f, 0x61]}}, &(0x7f00000003c0)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 07:14:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x801) [ 197.096312][T10144] BPF:Invalid magic [ 197.129838][T10144] BPF:Invalid magic 07:14:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000280)=""/200, 0x1000000, 0xc8, 0x1}, 0x20) 07:14:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000040)=""/210, 0x2e, 0xd2, 0x1}, 0x20) 07:14:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x19}, 0x40) 07:14:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:14:33 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) 07:14:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:14:33 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:14:33 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_tracing={0x1a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x889ea69d052ee389, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:33 executing program 2: perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0xfffffffffffffffb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:14:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff00, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/200, 0x1a, 0xc8, 0x1}, 0x20) 07:14:34 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@func={0x85, 0x0, 0x2}]}, &(0x7f0000000100)='syzkaller\x00', 0x6, 0x9b, &(0x7f0000000140)=""/155, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0x40) 07:14:34 executing program 1: socketpair(0x23, 0x0, 0xff, &(0x7f0000000040)) 07:14:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:14:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000140)="b3", 0x1}, {&(0x7f0000000080)='!', 0x1}], 0x2, &(0x7f0000000200)=[@ip_tos_int={{0x14}}], 0x18}, 0x0) 07:14:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x10}]}}, &(0x7f0000000280)=""/200, 0x26, 0xc8, 0x1}, 0x20) 07:14:34 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:14:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x3}]}]}}, &(0x7f0000000280)=""/200, 0x36, 0xc8, 0x1}, 0x20) 07:14:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002240)) 07:14:34 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)) 07:14:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0xf003, &(0x7f0000000080)=@framed={{}, [@func]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x9b, &(0x7f0000000140)=""/155, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) 07:14:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x98) 07:14:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001d00)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 07:14:34 executing program 2: bpf$BPF_PROG_DETACH(0x1b, 0x0, 0x0) 07:14:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, 0x0) 07:14:34 executing program 4: socketpair(0xf, 0x3, 0x0, &(0x7f0000000a80)) 07:14:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 07:14:34 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000001c0)={0x0, 0x0}) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000300)={0x0, 0x0}) 07:14:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB="2400000066000b0b0000000014c2000000000000", @ANYRES64=r0], 0x24}}, 0x0) 07:14:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) geteuid() [ 198.535837][ T24] wlan1: Trigger new scan to find an IBSS to join 07:14:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8910, &(0x7f00000016c0)={'ip6gre0\x00', &(0x7f0000001640)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}) 07:14:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce8c62860723bc41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:14:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB="2400000066000b0b0000000014c20000", @ANYRES64], 0x24}}, 0x0) 07:14:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)=@delchain={0x24, 0x66, 0xb0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x24}}, 0x0) 07:14:35 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x60012041) 07:14:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) recvmsg$can_raw(r0, &(0x7f0000002680)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 07:14:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newtfilter={0x24, 0x2c, 0x1}, 0x24}}, 0x0) 07:14:36 executing program 4: socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) 07:14:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:36 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = gettid() r2 = gettid() r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000180)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000000)={r4}) 07:14:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(r0, &(0x7f0000000080)=""/40) 07:14:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 07:14:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000500)=ANY=[@ANYBLOB="240000002400010000000000000000b0d3fb7000", @ANYRES64=r0, @ANYRESOCT], 0x24}}, 0x0) 07:14:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1b696cf8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:14:36 executing program 2: socket$packet(0x11, 0x2, 0x300) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, 0x0, 0x0) 07:14:36 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000b00)=@newqdisc={0x24, 0x24, 0x1}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000009b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0, 0x0) 07:14:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000b00)=ANY=[@ANYBLOB="240000002400010000ffffffffffffffdf000000", @ANYRES32=r1], 0x24}}, 0x0) 07:14:36 executing program 5: recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:36 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:36 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) recvmmsg(r0, &(0x7f00000033c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:14:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x21, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f7629100007f0000000022addee07bee"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:36 executing program 5: recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)=@delchain={0x23, 0x65, 0xb0b}, 0x24}}, 0x0) 07:14:37 executing program 3: pselect6(0x40, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:37 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:37 executing program 5: recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:37 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB='#\x00\x00\x00b\x00\v\v'], 0x24}}, 0x0) 07:14:37 executing program 2: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='system.posix_acl_default\x00') 07:14:37 executing program 0: pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:37 executing program 0: pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) ppoll(0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 07:14:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:38 executing program 0: pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:38 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:38 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 201.584639][ T49] wlan1: Trigger new scan to find an IBSS to join 07:14:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:38 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:38 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:38 executing program 4: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(0x0, 0x2f) 07:14:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:38 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:38 executing program 4: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:38 executing program 4: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:38 executing program 1: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:38 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:38 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:38 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:38 executing program 0: syz_open_dev$mouse(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) [ 202.478527][ T49] wlan1: Creating new IBSS network, BSSID 52:85:91:44:d5:fc 07:14:41 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(0x0, 0x2f) 07:14:41 executing program 1: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:41 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:41 executing program 0: syz_open_dev$mouse(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff7ffe}]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:41 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:41 executing program 0: syz_open_dev$mouse(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:41 executing program 1: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff7ffe}]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(0x0, 0x2f) 07:14:44 executing program 2: r0 = socket(0x0, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:44 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:44 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff7ffe}]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:44 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:44 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:44 executing program 2: r0 = socket(0x0, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:44 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) [ 208.443822][ T36] audit: type=1326 audit(1612682084.925:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10501 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465b09 code=0x0 07:14:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) r1 = getpid() tkill(r1, 0x2f) 07:14:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:47 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f00000021c0)={0x8}, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:47 executing program 2: r0 = socket(0x0, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 211.355333][ T36] audit: type=1326 audit(1612682087.845:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10530 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465b09 code=0x0 07:14:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:47 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:48 executing program 2: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) r1 = getpid() tkill(r1, 0x2f) 07:14:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:48 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) r1 = getpid() tkill(r1, 0x2f) 07:14:48 executing program 2: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 07:14:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:48 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:48 executing program 2: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff7ffe}]}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:48 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0), &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff7ffe}]}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:48 executing program 2: socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 212.395108][ T36] audit: type=1326 audit(1612682088.885:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10588 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465b09 code=0x0 07:14:49 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0), &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:49 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0), &(0x7f0000003900)={0x0, 0x989680}, 0x0) 07:14:49 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff7ffe}]}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:14:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:49 executing program 2: socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) 07:14:49 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:49 executing program 2: socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d000000000000000000000000000003000017"]}) [ 213.294862][T10625] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:14:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:49 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, 0x0, 0x0) 07:14:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 213.422390][ T36] audit: type=1326 audit(1612682089.905:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10645 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465b09 code=0x0 [ 213.500765][T10625] device bond1 entered promiscuous mode [ 213.589697][T10626] device veth3 entered promiscuous mode [ 213.610091][T10626] bond1: (slave veth3): Enslaving as an active interface with an up link 07:14:50 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 07:14:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 213.638193][T10644] bond1 (unregistering): (slave veth3): Releasing backup interface 07:14:50 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) [ 213.687518][T10644] device veth3 left promiscuous mode 07:14:50 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) [ 214.053112][T10644] bond1 (unregistering): Released all slaves 07:14:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:14:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:51 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 07:14:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:51 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:51 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, 0x0, 0x0) [ 214.720498][T10626] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 214.755642][T10626] device bond1 entered promiscuous mode 07:14:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 214.872531][ T36] audit: type=1326 audit(1612682091.355:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10779 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465b09 code=0x0 07:14:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) [ 214.919513][T10787] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:14:51 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', 0x0}) 07:14:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) [ 215.073790][T10787] device bond2 entered promiscuous mode 07:14:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 215.159613][T10800] device veth5 entered promiscuous mode [ 215.188519][T10800] bond2: (slave veth5): Enslaving as an active interface with an up link 07:14:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) [ 215.232522][T10818] bond2 (unregistering): (slave veth5): Releasing backup interface [ 215.287618][T10818] device veth5 left promiscuous mode [ 215.545510][T10818] bond2 (unregistering): Released all slaves 07:14:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:14:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:52 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', 0x0}) 07:14:52 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:14:52 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000021c0)={0x8}, 0x0, 0x0) [ 216.304506][ T36] audit: type=1326 audit(1612682092.795:7): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10888 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465b09 code=0x0 07:14:52 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', 0x0}) 07:14:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) [ 216.355968][T10896] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 216.472766][T10896] device bond2 entered promiscuous mode 07:14:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 216.592563][T10913] device veth7 entered promiscuous mode [ 216.622875][T10913] bond2: (slave veth7): Enslaving as an active interface with an up link 07:14:53 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 216.680222][T10930] bond2 (unregistering): (slave veth7): Releasing backup interface [ 216.703693][T10930] device veth7 left promiscuous mode 07:14:53 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x0, 0x0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) [ 217.051065][T10930] bond2 (unregistering): Released all slaves 07:14:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:14:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x0, 0x0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:54 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[]}) 07:14:54 executing program 0: io_uring_setup(0xc1, &(0x7f0000000000)={0x0, 0x0, 0x4}) 07:14:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) recvmsg$can_raw(r0, &(0x7f0000002680)={0x0, 0x0, 0x0}, 0x0) 07:14:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x0, 0x0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:54 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000001c0)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) 07:14:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x114}, 0x40) 07:14:54 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[]}) [ 217.904619][T11009] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:14:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 218.070886][T11009] device bond2 entered promiscuous mode [ 218.160598][T11019] device veth9 entered promiscuous mode [ 218.207438][T11019] bond2: (slave veth9): Enslaving as an active interface with an up link [ 218.277724][T11042] bond2 (unregistering): (slave veth9): Releasing backup interface [ 218.310407][T11042] device veth9 left promiscuous mode [ 218.495310][T11042] bond2 (unregistering): Released all slaves 07:14:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:14:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:55 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xfeff}, 0x6) 07:14:55 executing program 0: socket(0x0, 0xa00, 0x0) 07:14:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:55 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[]}) 07:14:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = getpid() tkill(r0, 0x2f) 07:14:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:55 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, &(0x7f0000000040)="89", 0x1, 0x0, &(0x7f0000000140)={0x2, 0x0, @private=0xa010100}, 0x10) 07:14:55 executing program 0: socket(0x11, 0x3, 0x7fffffff) [ 219.288464][T11121] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:14:55 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB]}) 07:14:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = getpid() tkill(r0, 0x2f) [ 219.383420][T11121] device bond2 entered promiscuous mode [ 219.410945][T11126] device veth11 entered promiscuous mode [ 219.442714][T11126] bond2: (slave veth11): Enslaving as an active interface with an up link [ 219.467205][T11121] bond2 (unregistering): (slave veth11): Releasing backup interface [ 219.515143][T11121] device veth11 left promiscuous mode [ 219.821869][T11121] bond2 (unregistering): Released all slaves 07:14:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x2, 0x0) 07:14:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = getpid() tkill(r0, 0x2f) 07:14:56 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000500)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x6, 0xd9, &(0x7f00000002c0)=""/217, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:14:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:14:56 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB]}) 07:14:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x4020940d, 0x0) 07:14:56 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB]}) 07:14:56 executing program 0: socketpair(0x2c, 0x3, 0x0, &(0x7f0000002540)) [ 220.096740][T11226] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:14:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 220.177343][T11226] device bond2 entered promiscuous mode [ 220.271345][T11228] device veth13 entered promiscuous mode 07:14:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) [ 220.315737][T11228] bond2: (slave veth13): Enslaving as an active interface with an up link 07:14:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={@local, @loopback, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1240007}) 07:14:56 executing program 4: socketpair(0x0, 0x3, 0x0, &(0x7f0000002540)) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f00000000c0)=0x1, 0x4) 07:14:56 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00\x00\x00']}) 07:14:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:14:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f00000004c0)={@local, @loopback, @remote, 0x0, 0x0, 0x6}) 07:14:57 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:57 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00\x00\x00']}) [ 220.636028][T11291] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:14:57 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 220.784706][T11291] device bond3 entered promiscuous mode [ 220.806887][T11295] device veth15 entered promiscuous mode [ 220.813180][T11295] bond3: (slave veth15): Enslaving as an active interface with an up link 07:14:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006200)=[{{&(0x7f0000000240)={0xa, 0x4e24, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) 07:14:57 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00\x00\x00']}) 07:14:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) [ 220.965099][T11351] ptrace attach of "/root/syz-executor.3"[11349] was attempted by "/root/syz-executor.3"[11351] 07:14:57 executing program 4: socketpair(0x0, 0x3, 0x0, &(0x7f0000002540)) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f00000000c0)=0x1, 0x4) 07:14:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:57 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:57 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='M\x00'/15]}) [ 221.078031][T11358] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:14:57 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, 0x0) [ 221.148544][T11367] ptrace attach of "/root/syz-executor.3"[11362] was attempted by "/root/syz-executor.3"[11367] 07:14:57 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 221.296043][T11358] device bond4 entered promiscuous mode 07:14:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 221.337789][T11364] device veth17 entered promiscuous mode [ 221.346740][T11364] bond4: (slave veth17): Enslaving as an active interface with an up link 07:14:57 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='M\x00'/15]}) 07:14:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) [ 221.442304][T11423] ptrace attach of "/root/syz-executor.3"[11422] was attempted by "/root/syz-executor.3"[11423] 07:14:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:58 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:14:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000002140)=0x1, 0x4) 07:14:58 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000001c0)={0x0, 0x0, "9da2e5", 0x0, 0x80}) 07:14:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:58 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='M\x00'/15]}) 07:14:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) [ 221.690109][T11440] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:14:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@private1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@private2}, 0x0, @in=@private}}, 0xe8) 07:14:58 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) sendmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[], 0x170}, 0x0) [ 221.891528][T11440] device bond5 entered promiscuous mode 07:14:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 221.947267][T11445] bond5 (unregistering): Released all slaves 07:14:58 executing program 4: r0 = socket(0xa, 0x3, 0x8) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000080)={&(0x7f0000000000)=@abs, 0x6e, 0x0}, 0x0) 07:14:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x2, 0x7, 0x101}, 0x14}}, 0x0) 07:14:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:58 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:14:58 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d00000000000000000000000000000300"]}) 07:14:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:58 executing program 0: socket(0x23, 0x0, 0x4) 07:14:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:58 executing program 4: socket$caif_stream(0x25, 0x1, 0x4) 07:14:58 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d00000000000000000000000000000300"]}) [ 222.392478][T11542] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:14:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:59 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockname(r0, 0x0, &(0x7f0000000080)) [ 222.559678][T11542] device bond5 entered promiscuous mode 07:14:59 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) [ 222.620674][T11551] bond5 (unregistering): Released all slaves 07:14:59 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x0, 0x0) 07:14:59 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d00000000000000000000000000000300"]}) 07:14:59 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:14:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:59 executing program 0: clock_gettime(0x6, &(0x7f00000014c0)) 07:14:59 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:59 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d0000000000000000000000000000030000"]}) 07:14:59 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000040)=@qipcrtr, 0x80, 0x0}, 0x0) [ 222.978164][T11640] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:14:59 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_buf(r0, 0x29, 0x45, 0x0, &(0x7f0000001000)) 07:14:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:59 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:59 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) sendmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x170}, 0x0) [ 223.090114][T11640] device bond5 entered promiscuous mode [ 223.116879][T11644] bond5 (unregistering): Released all slaves 07:14:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@struct={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000480)=""/155, 0x2b, 0x9b, 0x1}, 0x20) 07:14:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:14:59 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d0000000000000000000000000000030000"]}) 07:14:59 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:14:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:14:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) [ 223.822649][ T19] Bluetooth: hci0: command 0x0401 tx timeout 07:15:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, 0x0, 0x1}, 0x40) 07:15:00 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4d0000000000000000000000000000030000"]}) 07:15:00 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[], 0xe8}}, 0x0) 07:15:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x14, 0x3, 0x1, 0x201}, 0x14}}, 0x0) 07:15:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:00 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) 07:15:00 executing program 4: sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="197c26341124bd7000fbdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48000}, 0x40050) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @private1}, 0x1c, 0x0}, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x5422000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB="14000900fe8000000000000000000000000000aa0500030032000000060001004e240000060001004e210000"], 0x48}, 0x1, 0x0, 0x0, 0x4000810}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7, r4}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000040)={@remote, 0x0, r6}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000500)={'batadv0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@private2, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000006c0)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000980)={&(0x7f0000000200)=ANY=[@ANYBLOB="64020000", @ANYRES16=0x0, @ANYBLOB="000126bd7000fcdbdf250b000000700001801400020076657468315f746f5f687372000000001400020067656e6576653100000000000000000008000300020000001400020067656e6576653000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000300030000006c0001801400020076657468305f746f5f626f6e64000000140002006d6163766c616e31000000000000000008000300000000001400020074756e6c30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="14000200697036677265300000000000000000004000018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="14000200766972745f7769666930000000000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="6400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300000000001400020076657468315f746f5f626f6e640000000800030003000000080003000100000008000100", @ANYRES32=r4, @ANYBLOB="1400020076657468305f6d61637674617000000008000100", @ANYRES32=r6, @ANYBLOB="48000180080003000000000008000100", @ANYRES32=r7, @ANYBLOB="1400020076657468315f746f5f6873720000000008000100", @ANYRES32=r8, @ANYBLOB="080003001a05b8110800008250be55800800010000000000000000000000000073c8cbc458a081a9207a7e6efca8f4779309517b02885e61f5b9cdaf6e46d9bbd975b50f752d22a6164c4d568550201c831feb23a0ad450c49f0855ea7880f05f4537d219758d582d44fc9a25e57dbef2c475b", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="080003000000000008000100", @ANYRES32=r10, @ANYBLOB="1400020069703665727370616e30000000000000140002006d6163767461703000000000000000001400020073797a6b616c6c657230000000000000080003000100000018000180140002006d616373656330000000000000000000"], 0x264}, 0x1, 0x0, 0x0, 0x4000040}, 0x810) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @empty, @local}, 0xc) 07:15:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:00 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x17, 0x0}, 0x0) 07:15:00 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) 07:15:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x68], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:15:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) 07:15:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xc}]}]}}, &(0x7f0000000480)=""/155, 0x3e, 0x9b, 0x1}, 0x20) 07:15:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000180000000800010070636900110002003030303098c53c8781f2dffab8"], 0x60}}, 0x0) 07:15:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000280)={@multicast1, @dev={0xac, 0x14, 0x14, 0x2b}, @local}, 0xc) 07:15:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 07:15:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_pktinfo(r0, 0x0, 0x24, 0x0, 0x0) 07:15:01 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 07:15:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x5}]}]}}, &(0x7f0000000380)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 07:15:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) [ 224.807788][T11824] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x8, 0x7f, 0x0, 0x2}, 0x40) 07:15:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) [ 224.966478][T11824] device bond5 entered promiscuous mode 07:15:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c, 0x0}, 0x0) 07:15:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0xe8}}, 0x0) 07:15:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 225.058149][T11828] device veth19 entered promiscuous mode [ 225.089542][T11828] bond5: (slave veth19): Enslaving as an active interface with an up link 07:15:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:01 executing program 0: socketpair(0xa, 0x1, 0x6, &(0x7f0000003580)) 07:15:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000140), 0x4) 07:15:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0xe8}}, 0x0) [ 225.220260][ T36] audit: type=1326 audit(1612682101.707:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11887 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465b09 code=0x0 07:15:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f00000001c0)=0xfffffff8, 0x4) 07:15:01 executing program 0: socketpair(0x10, 0x2, 0x8, &(0x7f0000003580)) [ 225.341901][T11895] ptrace attach of "/root/syz-executor.3"[11893] was attempted by "/root/syz-executor.3"[11895] 07:15:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0xe8}}, 0x0) 07:15:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @loopback}, 'wg2\x00'}) [ 225.400253][T11900] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:01 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'ip6_vti0\x00', {0x2, 0x0, @private}}) [ 225.477671][T11900] bond6 (uninitialized): Released all slaves 07:15:02 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0x23, 0x0, 0x0) [ 225.533688][T11906] device veth21 entered promiscuous mode [ 225.560145][T11906] bond5: (slave veth21): Enslaving as an active interface with an up link 07:15:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x12, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:15:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:02 executing program 4: r0 = socket(0xa, 0x3, 0x6) connect(r0, &(0x7f00000000c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sm3\x00'}, 0x80) 07:15:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x1600bd7e, &(0x7f0000000040)={r2, @remote, @multicast1}, 0xc) 07:15:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000200)={0x7, 'vlan0\x00'}) 07:15:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x2, 0x0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) [ 226.165474][T11942] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8906, 0x0) 07:15:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x1}]}}, &(0x7f0000000080)=""/169, 0x2a, 0xa9, 0x1}, 0x20) [ 226.229492][ T36] audit: type=1326 audit(1612682102.717:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11945 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465b09 code=0x0 [ 226.257198][T11942] bond6 (uninitialized): Released all slaves 07:15:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x2c, 0x2, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_LABELS_MASK={0x18, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) 07:15:02 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='cpu.stat\x00', 0xff00, 0x0) [ 226.301193][T11948] device veth23 entered promiscuous mode [ 226.329369][T11956] ptrace attach of "/root/syz-executor.3"[11955] was attempted by "/root/syz-executor.3"[11956] [ 226.348512][T11948] bond5: (slave veth23): Enslaving as an active interface with an up link 07:15:02 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x4c, 0x12, 0x1, 0x0, 0x0, {0x2}, [@INET_DIAG_REQ_BYTECODE={0x35, 0x1, "fb96d0444f34b8cad83cbe0d93f40fda9d937cbc77e4a59b5e4f405e2fdfbbdcf53f8865a1a05ef1006e728a85ecf7062e"}]}, 0x4c}}, 0x0) 07:15:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) [ 226.575238][T11968] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 226.677949][T11968] device bond6 entered promiscuous mode 07:15:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000480)=""/155, 0x1a, 0x9b, 0x1}, 0x20) 07:15:03 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f00000002c0)=[{{&(0x7f0000000040)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)='M', 0x1}, {&(0x7f00000001c0)="f7", 0x1}, {&(0x7f0000000200)='W', 0x1}], 0x3}}], 0x1, 0x40800) 07:15:03 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 07:15:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_pktinfo(r0, 0x0, 0x22, 0x0, 0x0) 07:15:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) [ 227.131901][T12023] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000b40)={&(0x7f0000000800)=@in={0x2, 0x4e21}, 0x80, 0x0}, 0x0) 07:15:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x5}]}, 0x10) 07:15:03 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000340)=0x8, 0x4) 07:15:03 executing program 0: socketpair(0x10, 0x2, 0x3, &(0x7f0000000440)) [ 227.227597][ T36] audit: type=1326 audit(1612682103.717:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12025 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465b09 code=0x0 [ 227.242401][T12023] device bond7 entered promiscuous mode [ 227.331850][T12069] ptrace attach of "/root/syz-executor.3"[12067] was attempted by "/root/syz-executor.3"[12069] 07:15:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000), 0x10) 07:15:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000000), 0x4) 07:15:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}}, &(0x7f0000000480)=""/131, 0x3e, 0x83, 0xffffffff}, 0x20) [ 227.576233][T12088] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:04 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0x2, 0x0, 0x10) 07:15:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:04 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet6(r0, &(0x7f0000000100)="ee61187e", 0x4, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x24}, 0x2}, 0x1c) [ 227.684396][T12088] device bond8 entered promiscuous mode 07:15:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x35}}}, 0x1c, 0x0}, 0x0) 07:15:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000006c0)=0xff4a) 07:15:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2c, 0x2, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}]}, 0x2c}}, 0x0) 07:15:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x1c, 0x8, 0x6, 0x1103, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x8004) pipe(0x0) 07:15:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x5452, &(0x7f0000000200)={0x0, 'vlan0\x00'}) 07:15:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:04 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 227.986061][T12149] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 228.042584][T12149] bond9 (uninitialized): Released all slaves 07:15:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x5]}}, 0x1c) 07:15:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000000)=0x6, 0x4) 07:15:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000480)=""/155, 0x1a, 0x9b, 0x1}, 0x20) [ 228.100213][T12156] device veth31 entered promiscuous mode [ 228.139741][T12156] bond5: (slave veth31): Enslaving as an active interface with an up link 07:15:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, 0x0, 0x0) 07:15:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0x0, 0x0, 0x9}, 0x40) 07:15:04 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f00000001c0)={0x2, 'vlan0\x00'}) 07:15:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8904, &(0x7f0000000200)={0x0, 'vlan0\x00'}) 07:15:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_TIMESTAMP(r0, 0x1, 0xf, &(0x7f0000000000), 0x4) 07:15:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:04 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x40) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 228.419213][T12187] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000005c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 07:15:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x16, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000480)=""/155, 0x2e, 0x9b, 0x1}, 0x20) [ 228.493491][T12187] bond9 (uninitialized): Released all slaves 07:15:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x3, 0x80, 0x5, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) [ 228.556251][T12191] device veth33 entered promiscuous mode [ 228.590357][T12191] bond5: (slave veth33): Enslaving as an active interface with an up link 07:15:05 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, 0x0, &(0x7f00000000c0)) 07:15:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000380)) 07:15:05 executing program 0: socketpair(0x10, 0x2, 0x2, &(0x7f0000000440)) 07:15:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:05 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='GPL\x00', 0x3, 0x1000, &(0x7f0000001000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:15:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x40016000) 07:15:05 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000200)=[{{&(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="39ff", 0x2}], 0x1}}], 0x1, 0x0) 07:15:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:05 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000540)=[{&(0x7f00000000c0)="2c9caf", 0x3}, {&(0x7f0000000240)="dc34ba", 0x3}, {&(0x7f0000000300)="0a9bce", 0x3}, {&(0x7f0000000380)="a6", 0x1}, {&(0x7f0000000400)='s', 0x1}], 0x5}, 0x1c004) sendmmsg$sock(r0, &(0x7f00000002c0)=[{{&(0x7f0000000040)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000000280)=[{&(0x7f00000001c0)="f7", 0x1}, {&(0x7f0000000200)='W', 0x1}], 0x2}}], 0x1, 0x0) [ 228.942765][T12224] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 229.025841][T12224] bond9 (uninitialized): Released all slaves 07:15:05 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0x22, &(0x7f0000000040)={0x0, 0x0, 0x14}, 0xc) 07:15:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 229.154952][T12228] device veth35 entered promiscuous mode [ 229.186142][T12228] bond5: (slave veth35): Enslaving as an active interface with an up link 07:15:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 07:15:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000480)=""/155, 0x1a, 0x9b, 0x8}, 0x20) 07:15:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x4, 0x1, 0x3, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 07:15:05 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='\x00'}, 0x10) 07:15:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 229.457379][T12259] BPF:Unaligned type_off 07:15:05 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000440)) [ 229.489746][T12259] BPF:Unaligned type_off 07:15:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) read(r0, &(0x7f0000000000)=""/220, 0xdc) 07:15:06 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x8904, &(0x7f0000000080)={@mcast2, @local, @remote}) 07:15:06 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet6(r0, &(0x7f0000000100)="ee61", 0x2, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c) 07:15:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_pktinfo(r0, 0x0, 0x18, 0x0, 0x0) 07:15:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote, 0x6}, 0x1c, 0x0}, 0x0) 07:15:06 executing program 0: getsockname(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendto(r0, 0x0, 0x0, 0x5, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x61, &(0x7f0000000000)=0x2000, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$nl_route(0x10, 0x3, 0x0) sendto(r2, 0x0, 0x0, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000200)={0x0, 'vlan0\x00', {0xffe}, 0x8001}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000001ec0)={'bridge0\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000040)=0x80) r3 = socket$nl_route(0x10, 0x3, 0x0) sendto(r3, 0x0, 0x0, 0x5, 0x0, 0x0) accept4(r0, 0x0, &(0x7f00000002c0), 0x80000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x4, 0x7, 0xd0, 0x2, 0xa, @empty, @remote, 0x40, 0x80, 0x0, 0x8}}) 07:15:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, &(0x7f0000000100)="ee", 0x1, 0x810, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 07:15:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {0x0}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x31, &(0x7f0000000040)={r2, @remote, @multicast1}, 0xc) 07:15:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010101"], 0x2c}}, 0x0) 07:15:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) 07:15:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:06 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0x22, 0x0, 0x0) 07:15:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {0x0}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x2, 0x4e21, 0x2, @private1}, 0x1b, 0x0}, 0x0) [ 230.239511][T12319] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 07:15:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000480)=""/155, 0x2e, 0x9b, 0x8}, 0x20) 07:15:06 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x0, 0x8}, 0xc) 07:15:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000000)=@nfc_llcp, 0x80, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000b40)={&(0x7f0000000800)=@in={0x2, 0x4e21}, 0x80, 0x0}, 0x0) 07:15:06 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000400)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r2}) 07:15:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {0x0}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @private1}, 0x2000001c, 0x0}, 0x0) 07:15:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) recvfrom(r0, 0x0, 0x0, 0x40000322, 0x0, 0x0) 07:15:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_bridge\x00', &(0x7f0000000080)=@ethtool_sset_info={0x37, 0x0, 0xffb}}) [ 230.625977][T12354] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 230.778837][T12354] device bond9 entered promiscuous mode 07:15:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) [ 230.847028][T12358] bond9 (unregistering): Released all slaves 07:15:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000000)=0x8000, 0x4) 07:15:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x3, 0x80, 0x5, 0x0, 0x1}, 0x40) 07:15:07 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000040)=[{{&(0x7f0000000180)={0x2, 0x0, @remote}, 0x10, &(0x7f00000000c0)=[{&(0x7f00000001c0)="ad24", 0x2}], 0x1, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local}}}], 0x20}}], 0x1, 0x0) 07:15:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000400)={0x0, @ipx={0x4, 0x0, 0x0, "283fb1d862da"}, @ipx={0x4, 0x0, 0x0, "c342fe230a2d"}, @qipcrtr}) 07:15:07 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f0000000100)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffff}]}, &(0x7f0000000180)='GPL\x00', 0x4, 0x83, &(0x7f0000000300)=""/131, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 231.433307][T12450] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 231.517037][T12450] device bond9 entered promiscuous mode [ 231.559548][T12459] bond9 (unregistering): Released all slaves 07:15:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000001fc0)) 07:15:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x21) 07:15:08 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, 0x0, 0x0) 07:15:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe", 0x23}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x20, 0x0, 0x0) 07:15:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x1, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}], &(0x7f0000000100)='GPL\x00', 0x4, 0x8e, &(0x7f0000000180)=""/142, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:15:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev}}, 0x1c, 0x0}, 0x0) 07:15:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe", 0x23}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000480)=""/155, 0x26, 0x9b, 0x1}, 0x20) 07:15:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000015c0)=ANY=[], &(0x7f0000000240)=0x5d69a1dc4ac6f9c3) 07:15:08 executing program 2: socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) select(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x4b}, 0x0, 0x0) [ 232.011408][T12546] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:08 executing program 1: r0 = semget(0x1, 0x0, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x6, 0x1c00}, {0x1, 0x1000, 0x1000}, {0x0, 0x8bd, 0x1000}, {0x2, 0xdc6, 0x1000}, {0x0, 0x101}], 0x5) 07:15:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe", 0x23}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:08 executing program 0: chown(&(0x7f00000001c0)='\x00', 0x0, 0x0) [ 232.199687][T12546] device bond9 entered promiscuous mode 07:15:08 executing program 4: socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) select(0x40, &(0x7f0000000140)={0x8}, &(0x7f0000000180)={0x4b}, 0x0, 0x0) 07:15:08 executing program 0: select(0x5, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 232.248289][T12550] bond9 (unregistering): Released all slaves 07:15:08 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x14, 0x0, 0x0) 07:15:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb", 0x34}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@init={0x14}, @sndrcv={0x2c}], 0x40}, 0x0) 07:15:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:09 executing program 0: futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000180)={{}, {0x0, 0xfffffffffffff801}}) 07:15:09 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000380)=@un=@abs={0x8}, 0x8, 0x0}, 0x0) 07:15:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb", 0x34}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 232.528586][ T203] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 07:15:09 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x8) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) r4 = dup2(r3, r3) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x900, &(0x7f0000000100)={r2}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f00000001c0)={r5}, &(0x7f0000000200)=0x8) 07:15:09 executing program 2: fchownat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0) 07:15:09 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[{0x90, 0x0, 0x0, "0ea66bbeddd1e7cc430beabe16049717b9146f7203a27bf7da31e981221251b90d27008c72eaa49803438f7368d8d6b33ff9251323c3b4393992a2271cd651623da7c7510a6c24a858cfc555450e901c3005b55973919dafa1ead0b70190dd54b7a2822e089dcc8dd949f83be1753adcc4c215610579132173"}, {0x20, 0x0, 0x0, "952003ece0bac97c06"}], 0xb0}, 0x0) 07:15:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb", 0x34}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 232.737944][T12660] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 232.794954][T12660] bond9 (uninitialized): Released all slaves 07:15:09 executing program 2: r0 = shmget(0x2, 0x2000, 0x218, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) 07:15:09 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_buf(r0, 0x29, 0x1c, 0x0, 0x0) [ 232.842370][T12649] device veth37 entered promiscuous mode [ 232.868062][T12649] bond5: (slave veth37): Enslaving as an active interface with an up link 07:15:09 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="14", 0x1, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x2}, 0x1c) 07:15:09 executing program 0: sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) 07:15:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1", 0x3d}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:09 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x1c, 0x1c, 0x3}, 0x1c) 07:15:09 executing program 2: r0 = shmget(0x2, 0x2000, 0x218, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) 07:15:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1", 0x3d}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f00000002c0)={0x0, 0x2, "78b3"}, &(0x7f0000000300)=0xa) [ 233.142464][T12699] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:09 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000002900)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000002800)=[@dstaddrv6={0x1c, 0x84, 0xa, @mcast1}, @dstaddrv6={0x1c, 0x84, 0xa, @ipv4={[], [], @broadcast}}, @sndrcv={0x2c}, @init={0x14}, @prinfo={0x14}, @sndrcv={0x2c}], 0xb8}, 0x0) 07:15:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1", 0x3d}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 233.223780][T12699] bond9 (uninitialized): Released all slaves 07:15:09 executing program 1: getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) [ 233.306416][T12692] device veth39 entered promiscuous mode [ 233.345756][T12692] bond5: (slave veth39): Enslaving as an active interface with an up link 07:15:09 executing program 2: r0 = shmget(0x2, 0x2000, 0x218, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) 07:15:09 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @broadcast, @val, {@ipv4}}, 0x0) 07:15:10 executing program 4: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{0x0, 0xfffffffffffffff9}}, 0x0) 07:15:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce868250", 0x41}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:10 executing program 2: r0 = shmget(0x2, 0x2000, 0x218, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) 07:15:10 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x50, 0x0, 0x0) 07:15:10 executing program 1: sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000040)=""/165) 07:15:10 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x3e3}, 0x98) 07:15:10 executing program 2: r0 = shmget(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/198) 07:15:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce868250", 0x41}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 233.735480][T12745] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 233.783689][T12745] bond9 (uninitialized): Released all slaves 07:15:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x902, &(0x7f00000000c0), 0x4) [ 233.857435][T12738] device veth41 entered promiscuous mode [ 233.883220][T12738] bond5: (slave veth41): Enslaving as an active interface with an up link 07:15:10 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r0, 0x0, 0x0, 0x101, &(0x7f0000000140)={0x1c, 0x1c, 0x1}, 0x1c) 07:15:10 executing program 2: r0 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x54, &(0x7f0000000000)={0x6, {{0x1c, 0x1c, 0x1}}, {{0x1c, 0x1c, 0x2}}}, 0x108) 07:15:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce868250", 0x41}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:10 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) 07:15:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002380)={0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000000040)="3ea631149b93c7783af6", 0xa}, {&(0x7f0000000080)="82a88d2e260c99e4096fe7b41cb777e1bd1e6ece675802ac37bdd63a020440e924aeaf96a071bf51ba4f2e7b3bd3b9790772bd802d249a89be23c984c0341effe15d525b73102849b9c98dc9a816c032a0e2255357fc3f749aa47da34f5f37885460ab74ef2e5b0f6c6b366c19b05670951cf8d70f97474b8ffacc39f9", 0x7d}, {&(0x7f0000000100)="8258094b0328c7573e856ab51aa1206fc2ada3ce594a3a9f55e9b25b6d7295db57d2c494fcd47425e4058b54202a64a695e244427a5d5acde046b1ce06a59bb156698fbb6151baf5ff5e6e5e93020d7b892a8c116d5674b0aeee0701330e4200f3befdc808532e8b77ed08ff506e330b4840a45431ced0938bd8345abf5d5f17", 0x80}, {&(0x7f0000000180)="044d109d5cf59d9d1484eec8954e81c6545dec64b37b9a7b7bf8307cf3c195a9375f5625e31b737be2aca07896efea587eae49d384e3eb9d0bb6c26173299af49f9ccce21df676c9d74afc8d0f6e5dcb3834305dbf2cc732debd48fceeb81bd55481820f7f05a5e320bf6c6d9dce98aa3088e32bdf8d13c032ff006989f8175add3b1de1835ec024515caba8c1", 0x8d}, {&(0x7f0000000240)="cf83f66670e693c56e2ea9593e", 0xd}, {&(0x7f0000000280)="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", 0xe60}], 0x6}, 0x0) 07:15:10 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) [ 234.167653][T12777] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:10 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)=ANY=[], &(0x7f0000000140)=0x8) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000900)={r4, 0x0, 0x1, '!'}, 0x9) [ 234.225758][T12777] bond9 (uninitialized): Released all slaves 07:15:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fce", 0x43}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000001c0)=ANY=[@ANYBLOB="1c1c4e3d0000000000000000000099"], &(0x7f0000000180)=0x98) 07:15:10 executing program 2: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0x101, 0x0, &(0x7f0000002a80)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000200)=@in={0x10, 0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000240)="1f9bdb0ed6d1240c5a60e1b48572b2666842ffb1912b099bccd3a5aa259adbee59650ac5be5e92369acb1aacdd01ca1a240f2f6d3f8b6c8353fbbe6bbd26aad5450f97b05dc589b834d236cb69266791f3caa09bd748e0b709f2f3f68cf2670df61ab77ff0534118a9c75a5fa7d99d97f692fd9e30a1b63a13be66815f7e1f349f12b2e73b5f8f3590198c93956ab8527741252422b1abced670b0b22542ffdc4a160ddaed2a91d980143adc012b6fe762c7f44a5362b241417a2db506", 0xfffffdca}, {&(0x7f0000000740)="1450bcccd6c3affa77350792829520923437f04b1ebff8c397cff70b9a306ba0953e9a62eeb88f8bf7ffadd6be6be1f7275255b423e83a9c6083852d74d6d7a9739a6a5dedded2069a409f9ceb48cda7d73a4af3a27f2cea6e506cede749e4f47c5fa51f5288978ae9a05095ea9eb55bd7f4500a729685", 0x77}, {&(0x7f0000000340)="b41f6f562e07a5d83978dc108d79882fff49f2b65ed9297c8fe9156b9ee6e9d34a330a9200c287c13ecd76f9c0c6ec43bf7c98002e7a57b3fb10fdbeaff3", 0x4b}], 0x3, &(0x7f0000000400)=[{0x58, 0x0, 0x0, "5abc2fb0c4af6f91d5cf29c6aa018c3b6a04091945984494beb94fcc1db789e17d3e150285952cc86910194ae063cf91d332f405cf267a8dbbdb8d1b6bb7f600000000000000"}], 0x58}, 0x20005) [ 234.297473][T12790] device veth43 entered promiscuous mode [ 234.324902][T12790] bond5: (slave veth43): Enslaving as an active interface with an up link 07:15:11 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x32, 0x0, &(0x7f0000000040)) 07:15:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fce", 0x43}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:11 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@dstaddrv4={0x10, 0x84, 0x9}, @sndrcv={0x2c}], 0x3c}, 0x0) 07:15:11 executing program 2: mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/137) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 07:15:11 executing program 4: shmget(0x1, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) getuid() getegid() getuid() getgroups(0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) getpgid(0xffffffffffffffff) shmctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) setresgid(0x0, 0x0, 0x0) getuid() [ 234.654034][T12826] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fce", 0x43}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002380)={0x0, 0x0, 0x0}, 0x0) 07:15:11 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000080)={0x0, 0x0, [], [@pad1]}, 0x10) 07:15:11 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) [ 234.744011][T12826] bond9 (uninitialized): Released all slaves 07:15:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000500)='vegas\x00', 0x6) [ 234.802567][T12831] device veth45 entered promiscuous mode 07:15:11 executing program 0: chown(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) [ 234.846122][T12831] bond5: (slave veth45): Enslaving as an active interface with an up link 07:15:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:11 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@init={0x14}, @sndrcv={0x2c}], 0x40}, 0x0) 07:15:11 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000029c0), &(0x7f0000002a80)=0xff30) 07:15:11 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) 07:15:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:11 executing program 2: pipe(&(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 07:15:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180), 0x8) 07:15:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, &(0x7f0000000200)=0x98) 07:15:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:11 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvmmsg(r0, &(0x7f0000000f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:15:11 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$setstatus(r0, 0x4, 0x0) [ 235.325424][T12881] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 235.346426][T12881] bond9 (uninitialized): Released all slaves 07:15:11 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000001800)="b6", 0x1}], 0x1}, 0x0) 07:15:11 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x31, 0x0, &(0x7f0000000080)) 07:15:11 executing program 2: r0 = getpid() r1 = getpid() setpgid(r0, r1) 07:15:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 235.445048][T12884] device veth47 entered promiscuous mode [ 235.463882][T12884] bond5: (slave veth47): Enslaving as an active interface with an up link 07:15:12 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x54, &(0x7f0000000100)={0x377c870, {{0x1c, 0x1c, 0x2}}, {{0x1c, 0x1c}}}, 0x108) 07:15:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:12 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$unix(r1, &(0x7f0000000640)={&(0x7f00000001c0)=ANY=[], 0xa, 0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0xd0}, 0x0) 07:15:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x10c, 0x0, 0x0) 07:15:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000200)=@in={0x10, 0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000240)="1f9bdb0ed6d1240c5a60e1b48572b2666842ffb1912b099bccd3a5aa259adbee59650ac5be5e92369acb1aacdd01ca1a240f2f6d3f8b6c8353fbbe6bbd26aad5450f97b05dc589b834d236cb69266791f3caa09bd748e0b709f2f3f68cf2670df61ab77ff0534118a9c75a5fa7d99d97f692fd9e30a1b63a13be66815f7e1f349f12b2e73b5f8f3590198c93956ab8527741252422b1abced670b0b22542ffdc4a160ddaed2a91d980143adc012b6fe762c7", 0xb2}], 0x1}, 0x20005) [ 235.787472][T12913] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:12 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000200)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) 07:15:12 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockname$inet6(r0, 0x0, &(0x7f0000000000)=0x4d) 07:15:12 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x29, &(0x7f00000000c0)={r2}, &(0x7f0000000100)=0x8) [ 235.936754][T12913] device bond9 entered promiscuous mode 07:15:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:12 executing program 0: getresgid(0x0, 0x0, &(0x7f0000000080)) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 07:15:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 236.111699][T12976] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:12 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c}, 0x1c) bind$inet6(r0, &(0x7f00000029c0)={0x1c, 0x1c, 0x2}, 0x1c) [ 236.243962][T12976] device bond10 entered promiscuous mode 07:15:12 executing program 0: getresgid(0x0, &(0x7f0000000040), &(0x7f0000000080)) 07:15:12 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @broadcast, @val, {@ipv4}}, 0x0) 07:15:12 executing program 4: getgroups(0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0]) setregid(r0, 0x0) 07:15:12 executing program 2: sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) pipe2(&(0x7f0000000100), 0x0) 07:15:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0xffffffffffffff64}, 0x10) listen(r0, 0x4a) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10}, 0x10) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000cc0)='{', 0x1}], 0x1) sendmsg$inet_sctp(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="93", 0x1}], 0x1}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000340)='J', 0x1}], 0x1, 0x0, 0x2c}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x5600}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 07:15:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:13 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 07:15:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000100)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) 07:15:13 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000300)="92", 0x1, 0x0, &(0x7f0000000340)={0x1c, 0x1c, 0x2}, 0x1c) [ 236.564328][T13044] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:13 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) [ 236.639684][T13045] sctp: failed to load transform for md5: -2 07:15:13 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0xffffffff, 0x0, 0x0, 0x0, 0x4}, 0x98) 07:15:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 236.791729][T13044] device bond11 entered promiscuous mode 07:15:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000180), &(0x7f0000000240)=0x98) 07:15:13 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xfffffffffffffff7, 0x1c, 0x2}, 0x1c) 07:15:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0) 07:15:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:13 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000000c0)={0x3, "09d2fc0193aa148941f8b2a0b90be493b4d10a5e367111d96617d976490b09725e37d04ce3355a3dc9707cf4413f2733dcba56cbd1cafb445ded0d38f543150fe0fb11e8da75d934966c0ba08ebc0c5e2f81b9505d0c5bcbe94cd942905bf8fab68f935af8fc01482c64295471e93285f22fb4626761aacd2e3257a5cb294ca8f5c64be600b2b6c7776eba903c242baec9eb16b95ee344d73406543853ce984814cd8156cb35d23746ad7c505d895bc023c9b6fec5644c35be401a73d9324d1850709c4d0e63914d8353e1019a56eb3a1265c7c2de5a0d51e76bad01b951b94fcea19c9760de6620df42d043cdc7b4b44573f4de64d61627f5acaed6a884623f99bf01ab0663fd6e4e7a4091115bd11ce3dd0277212349fbad11f1964483b39e79524732f42b7999d8ebed0b8dbc44c3ab1d7ba6d420fe62d41b81580a2be01a83e9381cf78d567c0d3d767d7e6851664e33ae6481e7749eee9da7fbe487dfce58cd7fb856adce6e0e41adb51be6d1b12b9878f178d3a98e47a229c9d4cdb7da91e80d6cde845cd57083caf638bb4797ad667120b931be97d95b306b34248a4470e304fc5f9aeb67680ab03acfe72f6b67d4cbf7277a028daa4855c10094d731ce52f07a7128aeeedb1eb76b936b350c72ebd68100a0b89f926694334064de6ea97d1af7cca1748fce289d7505b81d6f5a656521f4fec70fafc384f93917dad1dc2bb52cdc8ed023f87c77c94f7ff966ea01d3c844c33a3273c46c4e7ab1f8d8e43786c4cba0ad05260f31f5d58751f7084d640c15afe41d7ab89ee5775e701c98ff5a21d74a7201dc84372ee840e5b03a40733524964a7cbe31c9920124075b384a35420e9571b597a03d6106c91b939f632bb62967873486e7b7f6c1255930e9fbe55c26d31072fec3976a08fb009395e8b3df36d9c8b9c37ebbc03a4ecb2792bf4e4b9693665403e5fbbf284183bac52a346208ba66d5b4424c4096c8e1e5fafb2fc4f329c22ef2d49dc6aa321aca6182b557dc1bf6dc2033c38295e0132ad2bed1d734b7672f0d4df7d0576b13a859bf3778da1179a8962260f1449d01323cdbbb3157c6350ebc2c14e28295d8fe9b93297a9029c48e6412ef51fb9d9849d6874fe12bd610be8554c506a565eb0b3eacf9641ed8f29470d310ea468fd72099a4e5c5ea7cd0c4604afb6bad2c12b6908cddbef8ee7268ad8b5be0b24b807f6f3beb7a98220498f6fec2dbedd240ea383bc2566557911ec6893682e5b96895e6e6951fe2a2005f1f73f345b205e8044d64a2b97d2535e58d801ca196e916847dce05aa6c8d55d5f73afc39298cb4195a4123cf330a3154f2abe0e047070fdc8745e28a0fd629741761f8682767790d7e72eda7979db70ad11b9d7193620dacb26fee93db38f1675feb2afb3edc77c19143df8b09f24e418a3db82cf5e2b0838c5dbc9612c678e1b2475d30d87308690607d3e3ab5953e05712ed14765ac7a6508b0d9aa33f189fac1b7e82bc31a90b35ad094f82e375a3251987056b84d3958858a3c6069268c0bc0e4915a364fe3185ffc6d9c4b18b7f87e444348388fdefe145b8b94dc8116ae42554aa60acb26a804204303dd354775c624c3d8de6aa2521bfff8ef7135db72df87e0b0937b170e34bf3abcfc6bf7b18be596aa322228003a8867a03ef26126ac5ae05e17c9950c4f1032941b60a1407c1ccfd5d30e7ed6490833265a4bfc9f42f0de7a9629aaf3fb2fb0bf2970aaf5bce58b98d8197630963cf137ba810b6ce6886a66d94f6a294654e256da4f2b5e61bab644909040a80e08f751e6f47522686fce06d789c75aec0bfc451789b2c24ff88f3f8ba58036436ccc70c6d8845b5f4d898479024282905e2e9b69a1b38d2709d1463d05b7cca07843d07ea1283f01deadf717e2d2d55c0d07dd77f3bffe31dff8db2a4963a0d41301da0f9c048ac9cc6c7c95b8698830ac048e31157757dd3775047f9f689f2cf242f074e92dacc2269f2a379f1e9d11b231e67e9a7ce8b3de3c59ae1574b15c810dd279f8b20c613290796b6d8b20ce1667e687558d49dc5a6615062fb088cb06b9c4c464f0012ca9cbacf9e1b202827e6e98af6c386522ab1f2a111f78096d5d2ddaef2f62a234e140abf7685e5c7ac1c4c39b08e9e36ea091c8f841874719910bab3c379e9efe254d4f0fe235f4ca4b0c28050c339fe066643e87d5524bb904bcf9b7becb28e1d67af5b72c7d67651dd6365c378596152666cfa553cd6981899be22a8017b24fc6bdbf1da91edc0a9938d2f552b9dc0a849e0c22102b98b1157e2435061ee46414dd700bb0e9d42e124db77f3da185a99b13d219002d72390a56387fbb10490fc563481f1042b36fb1fa6137cf1b8f45328d476760e7a4174e229b1cfaa64dcd45286299913dc4adba1d48fb21f13040a48ad8f93a6b9f8c59ab4477ae03cf9f270070d03cc7b4b90e1a970a1beab635f072aa07ac33ddf28b5defde7aef07ed036bb295382dacb8980a2a46e6e0ee87db9b72de1f7898d4d27203b60c3f864e5efeb9828d4dd6574c35271bdd780aabcdfb205d8eb88efcfd616674019b8680bee0fa6832d94d6b79b3d67a62b4881e6d7f530f3d5d13a4565590c757946c2e8f9d401f0f7d13ce73d0662155de796d061b5e5f6e512cd501fb1fd77a85123bd89b7585e97b07a4bd6a85adf7d85edcf35469159bf72d30fa93049ff398f0c3331f8ce46b92bdd067a5cfea33483742e10b904dd6ecf33bb39269026ffe1d5df339a52a3a4643a11f1baa8edcf8e81db61052bbfd3201d7bf941ce4ffbcbafcbd11209162c29c4b90e7dc59ff05d0f7043b800048cbf4b6fc0e8f8027b8acecc51aaa39263945903471cc8a5b5392e6295d19d819e98a2dc66a7412f8e342212844f6d0694046af4cc8f96943460be0a47404d9331608ed1100f98c0bee94a4776af5021f913afd6b9610d2ac76be21afe8f219e03c369a9944a305dd04e9695f1966cb6d89d7d56919e099a13b030cc0488581a65686b4da2f1c9dcfe4dcaeba552b3095531b67d139f01c1b0a7588a017234ae825340c61b712447910ba3557f90b8593035c4b1720ef4c1599be273a02c4d0b1c524377c49c04ff1f5880e00a019496ca2f78c649697cbcc3c08a1ebff5bb545d307592f4350a0adb16cfcfb362c1395c160241567035a86856646008f3a30bee50b96a1d967976a3805966a4c4aa052fc3bb6a15d365e9ba6fdef6a0c721b20da4093b2cf8ec7309910e81e8be6ab05ee87444b1f55a6142933e6bbf14e314c08dc905a8140a77d02d532f1154431a0f7cf16f7b80b1576c214952711729145fd93c64b5b649bb1b463c19d627e2a479cf4de94b39b89e6cb9cb504d1e78634066eaa477cdffcc93779620b79db12df8cadd2f9f13afa05ca909aa9eab2b9f9145018d937ae01b7919b24699a7f56242590adc0382174f8f13f27a4bb0848d2a6a7b2a0a7f836e081c83db48a11d45dc5939817d27b162e7b629e296f0f779a8977f977846e0240de77e14d518545305d77b4b3a4f148890c9e5051544bc80ac2f25ab72a0706f38748a9659d6395d37cc5734c61b39adfa18af6a1fa9a218d4637ff490a6fa65cb8f4f1190f26bc51648b6faf6d5e5bb018b6d6f87147e3ed17b646d867f45562cf15e107dc82a103d8446d7836eb3fad4e09e96e71258d0d95aecb15773832ce13aed9afc15a98da9b8dc83817d5cfef54aa8d1eb73a9813c1cacb4918d6947d28fcb50a0bb240c68ab5ab7340e61332d5282dd600531e38e869bee3f38d36d8aa7f17f59eecc24b3401cbbeea0a4a7865c33b0d6bb45f925ac039f2733e0e89e26a9e311b7665d2aa7c10cc9131a961e38e88864a0bc82ae48a6dc734703b0afb1a2ce344af94dab5e1492377a0890cc65717f860ac6d7a6469e96bd5e96a694331f6495cd9decb671e098b96662c90a1ae82ac3a7e156af7b431cd1cb1a59067bf9ba6cb33f6c474c29c85d0c62bd2556ae0e074c47c8f58cdaaa3001e0c1d1d05a20d2484dda55d3bdbadebb28adac9152670320d41860f7ef636dfce5577b2e46435a9117889494c50185bd5c3e9cbf308d621ec7b631b2f4097c6df0659003cb90905524076ab0605daaebefabda11fa8a6483cfe49931b103cb3e85326180819432a41f416080f5176ff08f3f8ed3fa639682032bfdefa5d172375cbfedc2750ad8b95fbec873964fd8e0d24da16a76f601891ba7c3154b39dac8e0ad0eb4599f2516ceb44c8b7746ef22e8605ab85b407a60e98b93aceba80c179581aa7eac0b267b6c0931b123a118d4ae25b986ae6a141a5bc757329bea173dd46ae58ef630cbe0ecbeafe9fcc143832d020f2f5d90aa632de704c6e4a10f3d3170a5a36a83265ca04da071d714f94589708bb7d670658ec9fa0a7a7f305b4e2b60223628ab3d3c7e0be4b72bb67ea7aadf702a9866ecfcaaeceb148855a87f2228ceebd1c180cde4defee8adeadf6128f2f1fe7352a40e94f583ce1ee6dcef421b9d382178538f930c69e00934717e395912ff1668a68b75f99b4c314d8af21c707a7b6ef6784010ace4da73264fce3651099594617e823a9cdb752727dd4127a5dc6dba16b1269683531dcd80473cfb0e009091baa457f95c3ae87ab67ec38f73084b38b52f46849dccaf68da48b1bf1cddde2f83c76c7492b534504ad5f9bd4c4b6369c0227b77866f193e64fe31d4f3a3cd165ad188629b0656c570084633dcb4b1fe92daa4b1d84619591c1b17cefdd61723f18eed3447933e08947390eb1da3aa1b6c3d027b806beb133996bd18367b0a60eb521f932d8628d3fc819900b05b6ae504192b69f13915dde6620b3d477e7cf9d90dc895da6ad893ddebbf23fac34b1e459bf2e9e9c94089fda2059deeadf09f259827a7f4035844773156d6b488584271fabe130a8e614eb70ae730b830aa08d01540f6415ed8e3ef934034c754d52624b6a289a44d3bd2d113cced01b6d6f81e9a800a30b5042098bfcc6e5c8f8125c45fc49859dc30ffe9a60e031d4602aece383272828c7180da11a471acde53e8083c262b3d054b84292aa8465fb6c2596b493e233a9cbb52192ddfdfe2a7fc6d3c709f3caf277e9cb492f1a68d9510f178f2c42f448532c16634b199787c8322496cfaf665f8b6e0216921b5a5a45215308699cad2b206d62a766a27fdc4723b2ccc3fde421783e9167faf9c10e0b8fa8f6847136db81db7ec23947be3ebe9002036ad15364b42ed8c22742faeb199bc83d365ecf3634871e44bcd66bf25d59bdd6217328cac2f0fc31edb3646df21be2f6ea4aaff1e17b7f6372d0ffea4026c899ef91ef52a0bc2c351bc3225c5c828cb334a980c726b22afc155e88a3ad84f4bad2e8d7410bf399217f826805ca5e9cb4fd5bd34a50e7e8adcc37f7d99b5f8270e48de565d0098d0a848f67b4273b4678a76c306b32d72616a514d22cc70d80b91e0c27658693b995528eedf7339b712936afc7798a1351b782164aed9cdc520bf7761fbf4ed0d0a17f3cd7656ac06e9b6e18cab9a4801b61a276d01080d1238acfd1f39ecf16bd45c4b5dcacbdbcc0cb52edae599dcf3f15db38b51c1df4ad5331a205a86123ad304f29252fa0eda8e0e6af5a87453d6611c0e92d359cd05f9864fe558df768107a16303e1ca86c1eefdf544b9b57f2c905c1f8c91b0c425d85ad796e315fcfd190275748e7b9edc795133d389cebde9ae8274b6f671e40dc4be1c34614dfb69c4b45e44957adafee773552291cd54"}, 0x1008, 0x800) [ 237.112907][T13124] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:13 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 07:15:13 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x2e, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) 07:15:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 237.184690][T13124] device bond12 entered promiscuous mode 07:15:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f00000000c0)="d1190d7a27dfc4382b643c270ba3d6d7dfb27765aed7bb2ead784baf199c2723c433255099f861e3b2513eb876b7210951efd442611c54c8db05153d0bfdf0ff8c5119795cec0c01cbb2be444bb68736e9cb3c3fffe09e4cd54ffe561b", 0x5d}], 0x1}, 0x0) 07:15:13 executing program 1: r0 = shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmat(r0, &(0x7f0000ff6000/0xa000)=nil, 0x2000) 07:15:13 executing program 2: truncate(&(0x7f00000000c0)='./file0\x00', 0x0) [ 237.407711][T13183] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), 0x98) 07:15:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, 0x0, 0x0) 07:15:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10}, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f00000000c0)=0x18) 07:15:14 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) [ 237.616708][T13183] device bond13 entered promiscuous mode 07:15:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup2(r0, r0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c}, 0xc) 07:15:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x20, 0x0, &(0x7f0000000080)) 07:15:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x3) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) shutdown(r1, 0x1) 07:15:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:14 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x51, 0x0, 0x0) [ 237.859124][T13248] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:14 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) 07:15:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:14 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4008c, 0x0) [ 238.082918][T13248] device bond14 entered promiscuous mode 07:15:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:14 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c}, 0x1c) 07:15:14 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20108, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000040)="9a", 0x1, 0x0, 0x0, 0x0) 07:15:14 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x33, &(0x7f0000000000)="1ed7441b", 0x4) 07:15:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000001c0)=ANY=[@ANYBLOB="1c1c4e2100000000fe"], &(0x7f0000000180)=0x98) 07:15:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 238.379481][T13331] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x20085, 0x0, 0x0) [ 238.463369][T13331] device bond15 entered promiscuous mode 07:15:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)=ANY=[@ANYBLOB="1c1c4e230000000000000000000000000000ffff"], &(0x7f0000000180)=0x98) 07:15:15 executing program 4: truncate(&(0x7f0000000040)='./file0/file0\x00', 0x0) 07:15:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0xfffe, 0x1, '0'}, 0x9) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) r1 = dup(r0) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) 07:15:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:15 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x16, 0x0, 0x0) 07:15:15 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000040)={@random="97c7c70d086a", @random="3a10e5bf6496", @val, {@ipv4}}, 0x0) 07:15:15 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockname$inet6(r0, 0x0, &(0x7f0000000200)) 07:15:15 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000002900)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f00000026c0)=[{&(0x7f00000001c0)='5', 0x1}], 0x1, &(0x7f0000002800)=[@sndinfo={0x1c}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast1}, @dstaddrv6={0x1c, 0x84, 0xa, @ipv4={[], [], @broadcast}}, @sndrcv={0x2c}, @init={0x14}, @prinfo={0x14}, @sndrcv={0x2c}], 0xd4}, 0x0) 07:15:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 238.812927][T13399] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:15 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) [ 238.913504][T13399] device bond16 entered promiscuous mode 07:15:15 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f00000000c0)=0xaea, 0x4) 07:15:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:15 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) 07:15:15 executing program 0: munlockall() pipe2(&(0x7f0000000140), 0x0) munlockall() [ 239.237944][T13472] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:15 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x28, &(0x7f0000000240), 0x4) 07:15:15 executing program 2: r0 = shmget(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x2000) pipe2(&(0x7f0000000100), 0x0) 07:15:15 executing program 0: mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000140)=""/4096) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) mincore(&(0x7f0000fff000/0x1000)=nil, 0x1000, &(0x7f0000001140)=""/4096) [ 239.403225][T13472] device bond17 entered promiscuous mode 07:15:16 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000040)='\a', 0x1}], 0x1}, 0x0) 07:15:16 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000080), 0x8) 07:15:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:16 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) fchown(r0, 0x0, 0x0) 07:15:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000200)=@in={0x10, 0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000240)="1f", 0x1}], 0x1}, 0x20005) 07:15:16 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=[{0x10}], 0x10}, 0x0) [ 239.731218][T13545] bond18 (uninitialized): Released all slaves 07:15:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 239.829402][T13545] device veth67 entered promiscuous mode [ 239.867020][T13545] bond5: (slave veth67): Enslaving as an active interface with an up link 07:15:16 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)='X', 0x1, 0x0, &(0x7f00000000c0)={0x1c, 0x1c}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="cb", 0x1, 0x0, 0x0, 0x0) 07:15:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000000c0)=ANY=[], &(0x7f0000002a80)=0xa0) 07:15:16 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x14, &(0x7f0000000380)={0x2, [0x3, 0x0]}, 0x8) 07:15:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000200)=@in={0x10, 0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000240)="1f9bdb0ed6d1240c5a60e1b48572b2666842ffb1912b099bccd3a5aa259adbee59650ac5be5e92369acb1aacdd01ca1a240f2f6d3f8b6c8353fbbe6bbd26aad5450f97b05dc589b834d236cb69266791f3caa09bd748e0b709f2f3f68c", 0x5d}], 0x1}, 0x0) 07:15:16 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 07:15:16 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)=ANY=[], &(0x7f0000000140)=0x8) r2 = dup(r1) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r5}, &(0x7f0000000080)=0x10) [ 240.174154][T13584] bond18 (uninitialized): Released all slaves 07:15:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:16 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x33, &(0x7f0000000000)="1e", 0x1) [ 240.220376][T13584] device veth69 entered promiscuous mode [ 240.242208][T13584] bond5: (slave veth69): Enslaving as an active interface with an up link 07:15:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000d40)={0x0, 0x0, 0x0}, 0x20188) 07:15:16 executing program 1: getresgid(&(0x7f00000000c0), &(0x7f0000000080), &(0x7f0000000100)) r0 = shmget(0x0, 0x3000, 0x588, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/48) 07:15:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:17 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0002"], 0xa) [ 240.504876][T13618] __nla_validate_parse: 2 callbacks suppressed [ 240.504894][T13618] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 240.568218][T13618] bond18 (uninitialized): Released all slaves 07:15:17 executing program 2: shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x0) 07:15:17 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 07:15:17 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000380)=@un=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}, 0x2010a) 07:15:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 240.654500][T13623] device veth71 entered promiscuous mode [ 240.683358][T13623] bond5: (slave veth71): Enslaving as an active interface with an up link 07:15:17 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000400), &(0x7f0000000340)=0x98) 07:15:17 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, @val, {@ipv4}}, 0x0) 07:15:17 executing program 4: sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmat(r0, &(0x7f0000ffb000/0x3000)=nil, 0x1000) 07:15:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000140)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:17 executing program 1: mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000340)=""/240) 07:15:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002380)={0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000000080)="82a88d2e260c99e4096fe7b41cb777e1bd1e6ece675802ac37bdd63a020440e924aeaf96a071bf51ba4f2e7b3bd3b9790772bd802d249a89be23c984c0341effe15d525b73102849b9c98dc9a816c032a0e2255357fc3f749aa47da34f5f37885460ab74ef2e5b0f6c6b366c19b05670951cf8d70f97474b8ffacc39f9", 0x7d}, {&(0x7f0000000100)="8258094b0328c7573e856ab51aa1206fc2ada3ce594a3a9f55e9b25b6d7295db57d2c494fcd47425e4058b54202a64a695e244427a5d5acde046b1ce06a59bb156698fbb6151baf5ff5e6e5e93020d7b892a8c116d5674b0aeee0701330e4200f3befdc808532e8b77ed08ff506e330b4840a45431ced0938bd8345abf5d5f17", 0x80}, {&(0x7f0000000180)="044d109d5cf59d9d1484eec8954e81c6545dec64b37b9a7b7bf8307cf3c195a9375f5625e31b737be2aca07896efea587eae49d384e3eb9d0bb6c26173299af49f9ccce21df676c9d74afc8d0f6e5dcb3834305dbf2cc732debd48fceeb81bd55481820f7f05a5e320bf6c6d9dce98aa3088e32bdf8d13c032ff006989f8175add3b1de1835ec024515caba8c1", 0x8d}, {&(0x7f0000000240)="cf83f66670e693c56e2ea9593e", 0xd}, {&(0x7f0000000280)="e33e54cd3fbbb839179b87e4a2d322ac403b748800b280d7d1f18e7c9249cabedf848fd8c8115f220e50e409635e863cf66e87e46b97dcd5d3cd96415ccf37f462bb43210577f607dc08a8aeb8a1e0850c51ea9bae931cf3425da333474788d17e2816742ad526403d45f4c362b0c07d50bf1c8d48555f779b64529ec2dfbdd488abc424e61ce3d4961b2cda367231c76afc038f4b0ce373174d23d39cbf10f84aeadba6065a8e78857620f3379834d99bd1b06775e46eb0bf795a7a10b7fc8bf145cd15672e137c4f953429ba0c26e93dad842e463ddbdfe524ff56924c7e2f4aa24835e62fbb8efc06b87a71fcb6988801d6a7a0a62845e4857bab8a1f780a81dfab402039745d6e84efdcfa21e24a78df7ec868e4395c8876d20f38027e979c6e9683f56be9edf08248fe12ae42a1ce77cbda67c3de981bc964648cbc67d2401f36df22f10292f075ed06040973054eadf6e277ef2a51744f9e83058a667581e0c61080b31f71136cc14ac9298cca4cdc83e4557087f446e2e0a519cc3f7bdfa17a118ca6c4bd0a9e72cd28ec6bcf41de1f75d3d524e507a55e2dcdf470f9d0be2b8f063915e2c385802e1bdc63642a18ba6e31de8ee837e2d5378437263826ac6e0c5d13828234ad41efc9917e51e8dda9809001aa8f747f1228ea4fb65e4894d3684ab9b8be8c869d96457ca4fcde9476cd19d1ccc745be672ba30bf0553454e3f39d166fff8fe0138a1ae7eab13eb13c6b6ce86b521bb781dd9415f736ccfaeefdcd0dc7591bf5e36fded1acae207f997611082c1becf0ecd2f729091fddeb594f3828e82ff5c771268b3ac936563686a6c6b6b670c199cf2cc3fb2a5644a27b369e2f2842ecfc3340572836a6b1f669c7c3018af163a1e9539493e86b4edbb44cf5b59295442aec4303a00836ea6786e5a9697c988aa1e0ce9d5fe0ce8b840025edc9dd00edaf5316cfae797c4bbb59d923232d583f67b9c776a4ade28d408de444571ecc2d2ca637e845b477f84239b762bc8a1ee7874c03cf866507fcad02909d74d540aaa15a489a1c17215a4c231f742d2dd00baf5939555675eee6b93a7c27a749513e65b29ec4d7e58c27e5bc59d80cc62f78e95b23421673dcf60bc7a4998064bae850e13ce9baff35e45029353aa9edad7d1b4b75bc5c01f75068b57fa5cd972821a46a5dceadc19120b493f9f6616dccb47072fc4504444a150177a7df3a1425f4b075ca4da545a236c26ae31ad78cb1b8bf0c6c42d5c0d315477a5f32acee7a73aba0fb01d635b6e21ab51c10d34eae5ea98f79ff6b7248552046a9d6abfb6c0d78a7e4d710652e7c81677714171b524f8c3359a03523fb5d12cbd98d439540c500b283f1026efabf1024e355cb4c65af0ed2bf0327c194187254c65e267995bc595574ef3b56a7e61b22d565c159dde508cf283d0a15e8df86db29598a0ff1568bde7515b9baa007a1276b5ab6908134139d37d6eb100b3896f1196c5a8ffbddbad924b4c1675bbaa08c57a54310d93afa78cc8ca01847c9b8b973eff36779331bb291f26059df8bc635ce517194dde789d00d69bf03f6e603a8310f6661fdadc8fb8ce330b582fc526de48f4b8d2fdd768d09df44dc119d24c038f0e230a8a69c2fea3def84e152aebe8b685fc8da6b607e97250bf513a23b6aee44f8024475d0cf1bb4c9a1c87fdbc60d5f8d1cbc06dda46ae00267a9d1f7b706a73d5a074e83cc8a82d7dcd4f2c7d98eda1734f8e2ae534616d96ebdd5735d1a98e76090909c51d65f0c5eabfb9f57fe30dabf04379d27f2d4d009e22ce7400f9e43c2478d391e9ed6b78761a3395fff4d86e24f580f535419c39b47e194866cc37982beadda4b857d8a62084e724d54d5f779768229bda8ab1ac86309bc3029cb7b84ba7a954313e8a3c17393ecd72da11cc373298d5407e7684e3f98c5435d769ac2d2439a2895e54e4b2adba25d813dd695d9e708eb3da3560cac8ec3f60665f406767fbeb277c4df79c062c659fbe1dd8faec3f112eb473fe6d549082e6358ff87e97fd5be4c45e69c15c73535604fb2c4b7b4e8cc151ff813b7caf783a64873b3116c7ba7f11026a59d6c3bdad2dd34ee12c75af00f5f43aaf11c6c260c3bc992a8a383aa551c4c9050d88b906deee796bf3a1f155141d254b3cc42482ea92b46cd7cde82ff0339ff8663945f5427b99511d3c093bfd4fab2e4736e12ec42e2c7a74f0b92455688bd5a580677db370fde32cc80994ead3e1f7b7aa238ab7a4f8d35cfd79eace301c2af7f2b9196eb25586ac349bd801efe8ca1f96f1530b8b10d1aff070269c0a10955e1c0319e14061bf7e6e0d1fe81f55983c1cdbccadcccd27294c02da0fe0ab2c64c1a1b9c4a75cd4170f78a3e17dd2642781b3a49ee4957c3c97582054ba01e719b7fd67fd4eddc6f7350e3270c48dc83196f6744c6b0af717faf74b045d47b100a37db12f1d5a39087fa858736ec3742c22c73cbb40edc94aff6452dfee424fda0daf88e6b03a3fe08221bcf60115f328c4279d465f12b0c8f0a3ac91ae39bd48f934fa8bcc6e74caa204962016be2d07d1b9a069181c1e495a04a1697b1cfa4ac4dfded0476daaa56a351a91fc44592ceb52010c398a06fce1e56f95b0bea1a1ad2a068863a53c4d2f7ca727cede3ee96bf3a30d9ad6de5a4e2e89437a55f2fda596f63b79a006629525b1b2c5ce9eaea672cf41797c4c9d131664f89e4fea7f60f2192c15542549c5169d8bbc76ebc837d44e717cf3048d6b40a72e2d951ba2e5049db65b2bc80501e7d696e9ae0b636dfdd4d1a97c01f099be6c9765873b82676f1a41b5b8a967a6bed180652810ad4013e4007f84c224e3a714a66b0ad9a091c2755a944bda086c2e18d6ce4b96e05cf3e518ef3ed23d3c76e60b6fd272768c1a2c98729a8dff45b1f5ac22e9b66cb1239971b6fd754c852125a88a7094f0b58ee783b8094883f85afaa5942a3ec11d25938b6971e7e2d00f86df6af151e1d5e220ff75957da8ee37098ccb0bfb65d63014a94cc07d0a354f7ceab7b734782f51462ea6fbf41a637a2bd8eea8ad39eed46b1457e414f71bc98b2a3e9b742f162426404f6c991496b80148da860784a2eba9ce14f8b122c3afd4dda7d76eee714132f0c7039f391943429706e7b4b2a4481018c73ccbb8852873e0b77f0c177687df153358ea600db9967bed0dc3485e341cd70edce1e57a70beb23b919cd25ef9e89b5d439bd1ad97889288df226b64365169f0007871608c72d2d8b5655eedc4f123e6b626073b7ef7ba892814197cf066979379b288f690b652e3e3fa69ea7252b6dbf005e4e4ed94847c0e9cb7b7f23a2861714437f85b3ad8f7d3f44c70961c53c5a9527a048cf597f56e2a260973388002265e6e4c9ad8a7c68844f4aad0bbd117c19b2f0edb7f9398d4cf1631dfca5e3ac5354e1f14d396e5d8f36209cdb4b27202997f3c266b777e97c85f8127205fca46597afa065dc1f78c37b4aeb9740d635145e0af7ac7a3abd6b0dad2245eddc7a55ded67a286cced09e55a599a7389c8dd9f60ee36eb49af562db28a45c958818fe60d8672a224cbc78d243a6750322b3426a6fc07fc7b391769c4a69d6b558e61c1071254b5b6279482176ff1fcbc95c8158a5937235c70e428d34cb296aaaff8b6cfb598065d31b4aa7b8887322c504cd16937c8112b8b04813a8dde72c23bae24f98bf9940f8f45af2e7a3d5cce744b89a066012209248ec4513055aefb8297d69ef0fa88556a77e4b640360bab1a902594204236fb918ce50618345272de8d0e20403473fa042dc584951953725773493da909ca77b114aa0097ad592e3469e5698ec305c678d079ae41b21695e537ff47b1f39318cdf2f20de4b362c0dde05b7b302c557f6ae05ee03c1842f5d9bbbfc157837b65658a33d42eb4aedb7dddd4ab3a796119e5138533d6a08618c52a948cb597bb8caac35c201fe425652adc56fa56d0e594429805db15e99e32592d9aea4a64ebccaddc47266f701ac3e961809ab2cd17eadb8cfb9f5b1bd7d9f39a68b4795c13f35af50d08af955e40f932225bd9f68a4ccd17d6d0346669d005d77fd281148c1ceeb1b11364dba74cdefcbcea3cd8e3fabe89dda226318995a1b8af121de8b5118d8e9151b6a6cd9f14dd292c24e6952adf9bf6cf786afb2e62d471f30de4b8fff890d58d76cf41c4f3abbb4188e3e2b25bb5611aa6a3f11ec786e3f9f6845b0b3492f683117a3228cc43a64be28aab599112e79cdea0947a82790f5a56afbfee5429f680cff6768dbb1f09ced63b1a614e68fc3d91e37720de075d00c195e0efb1ad73065af700406f2e959e830359b308d2880ae993f198b660bd06651e74817b0372d80f74b755d7b70af28cc121d8c6833690c0e309d39178c27ed19e16c730f93f85d524745969e997ef272b80efcad82947600fc789752fe92e63d661b36426ec7d6dafbbf831d6de823746cab3b160d9111561883d14f4770621603564eee75d1a64bcdc298e588864ba1435f6c6380a19e8f8c31debf63660f43612102f50d6749dfb3d26dc87ddfdfca1f44835a7cf5fcad39db6007d5c2142aaed07311016916045af83b6ae25d4f48ed9c583195936b91d255cc8e1e7c68e29764ce686190fd12113630790994f8eda99b40c29ae9baa1378ddf1044cb2c8a0a2db85e86983dafb01ab9ac370ebc3d76c69b02b5bb4b8618cf5785e764792162c27a5fae06cce5c54cf7911ebed22ba9def71d9f3aef0426a911197786276083697630a6765557fbe77b17613fce832a7fbeab62d06365b3d3973fe664d86d2a83bb31708392b8564f255dc1a4fff497ab45b6a0202670be21515dcc118f71303689ff8973891202571ae958f29d3394b10e1da76b8363c96dfb3e71cf1b0de0790ebd330b9bf4739cc500e4210577e82df3806310adb07cb42fe4c6a5f1288bed309e6bb343b62206ca2bd57990a36a5ab911ec23cd2e9eb513c65c033cda9906744146b0fed86bc4a29e20e1cad234455d8dd55916acc5f86477993a73447ca9254e1a7256aebe87c79bc45c596bb530e80e7030037dc19d9328ecd67602ee2910cb6be6d3eea9a49392e9a58d24d7fcd3a9d97bf0d52c6d738787c428cd298e209786ab3a566d025a02b565ead906974f05f37f948dca08c7f1e76e592d92259a95dcc880d36ab9c68199ce950e085b11e3b11f1cd2d1e2b6302e27f5e73cae5b7ce3201771e51c9cc20df5dea28fbd9fbc699581b9b03c6ea610460b7ea007c0a21605bdcba85f0b94bd6442d31bdd269151aa0b986c0beec493ca5e6c931e7061483aeaa96f00d19dcde91a5ed4c6033d307c095c3af355129c378f93f9b8492fe3926f9af1369b9b4ca7a57f39066af5e3e53f8b0a498406042f252bf4373b6af41f39ca7e32c0e157780492890003a24417208f891e8e9d5dd987083c2941e97886355d75fc0876863b1e649f465aa55fd778a6437533b20e52872488a5653539d68e020c5de77d1c80b1d2696a50bb80404d71e34d139ecde2f0f506bff6d69e312f45a783b5feffa4accff32d284f51274e99a3c23eade612f0f8d083bbbfea7e04e11ec973d5ee00529ec634ccfab7d2253e1bf73514483555610b05ed4533bfed7ca12c53d0e6deca36fe5eb32372796b709f409ff2f996d26c57d60e9714e46361e79168b06893bef518d9d410826eaaa9cac15e9eaf5c5b4b945dc68db1ba8f0cb354ddae05396b234507d6f09a67f53808ec750c6b68b586f848c39e007e", 0x1000}, {&(0x7f0000001280)="cf4a68270aa70d59e7b79e7ba2cfb57eae17878748a1907fb99e6f5688ce4295544a6416ed7cf163f63a2d0c45b5d31289c26479c215b76b1487a1555eafe46ae6145493d924bc69e6323a8e508253fa71d480b78fc42e7b8fb96b2ed6ee0bf8abe8d8fb274da525efcd", 0x6a}], 0x6}, 0x0) [ 241.026839][T13663] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000340)=0x101, 0x4) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="79a8c8aaa8e421a966f7148e79c973b2dde38dee6e6b7201e7facebb68fcbdd72f6f4bdae4eef9457269c9dc1cc8fc1baba30b2fba1f4a9d2510e52dd11a919ae5d4ae4d55cc58c65baa43f3f6b5c750ce375b7c52fbba8593b54c441e67ae9efb27c34cc43b7cc4b2d6cae0dc1853b926071af5c95569cb93c957dd0ad3c26a1e7ed317150e875da806d3413b238fc21dfad3ae1fdec05a59", 0x99}], 0x1}, 0x0) 07:15:17 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001400)={0x1c, 0x1c, 0x3}, 0x1c) [ 241.076722][T13663] bond18 (uninitialized): Released all slaves 07:15:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:17 executing program 1: mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 07:15:17 executing program 2: utimensat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f0000000040), 0x0) [ 241.223536][T13671] device veth73 entered promiscuous mode [ 241.239033][T13671] bond5: (slave veth73): Enslaving as an active interface with an up link 07:15:17 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x50, &(0x7f0000000300)="1cffcee3a4367752f69a67aad6e98875367999b867de85c3bdd06842b8f891cb29d74ac43b4163997f7ae2e60b3f6f7a6b54a65023f7495646c3c7ff675ecddfaebf8ad67a746bc4754d2361575d1a6747bfdacbc8edba139db532967f854316b86b9e0c2ed82e77a50117a4a7603e46ea07e2cf7ee067042201c6dfc3be19d99c457992afc2a74c", 0x88) 07:15:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000140)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:17 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 07:15:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000140)) 07:15:17 executing program 2: getgroups(0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0]) setresgid(0x0, r0, 0x0) setresgid(0x0, 0x0, 0x0) [ 241.519023][T13701] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 241.555859][T13701] bond18 (uninitialized): Released all slaves 07:15:18 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r0, &(0x7f0000001400)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000001600)=[{0x10}], 0x10}, 0x2018c) 07:15:18 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 07:15:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002380)={0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000000040)="3ea631149b93c7783af6", 0xa}, {&(0x7f0000000080)="82a88d2e260c99e4096fe7b41cb777e1bd1e6ece675802ac37bdd63a020440e924aeaf96a071bf51ba4f2e7b3bd3b9790772bd802d249a89be23c984c0341effe15d525b73102849b9c98dc9a816c032a0e2255357fc3f749aa47da34f5f37885460ab74ef2e5b0f6c6b366c19b05670951cf8d70f97474b8ffacc39f9", 0x7d}, {&(0x7f0000000100)="8258094b0328c7573e856ab51aa1206fc2ada3ce594a3a9f55e9b25b6d7295db57d2c494fcd47425e4058b54202a64a695e244427a5d5acde046b1ce06a59bb156698fbb6151baf5ff5e6e5e93020d7b892a8c116d5674b0aeee0701330e4200f3befdc808532e8b77ed08ff506e330b4840a45431ced0938bd8345abf5d5f17", 0x80}, {&(0x7f0000000180)="044d109d5cf59d9d1484eec8954e81c6545dec64b37b9a7b7bf8307cf3c195a9375f5625e31b737be2aca07896efea587eae49d384e3eb9d0bb6c26173299af49f9ccce21df676c9d74afc8d0f6e5dcb3834305dbf2cc732debd48fceeb81bd55481820f7f05a5e320bf6c6d9dce98aa3088e32bdf8d13c032ff006989f8175add3b1de1835ec024515caba8c1", 0x8d}, {&(0x7f0000000240)="cf83f66670e693c56e2ea9593e", 0xd}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="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", 0xe60}], 0x7}, 0x0) [ 241.618237][T13712] device veth75 entered promiscuous mode [ 241.650773][T13712] bond5: (slave veth75): Enslaving as an active interface with an up link 07:15:18 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0xffffffffffffffff}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xe, 0x1c, 0x2}, 0x1c) 07:15:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000140)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:18 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup(r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x25, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r3}, &(0x7f0000000040)=0x10) 07:15:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) [ 241.857763][T13738] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 241.883714][T13738] bond18 (uninitialized): Released all slaves 07:15:18 executing program 0: mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/137) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f00000000c0)=""/86) 07:15:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000000)=@un=@abs={0x8}, 0x8) [ 241.972743][T13742] device veth77 entered promiscuous mode [ 241.987255][T13742] bond5: (slave veth77): Enslaving as an active interface with an up link 07:15:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x10}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x6}, 0x8) 07:15:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000080), &(0x7f0000000000)=0x98) 07:15:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) fcntl$lock(r0, 0xb, &(0x7f0000000180)) 07:15:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:18 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r0, &(0x7f0000001400)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000001600)=[{0x10}], 0x10}, 0x2018c) 07:15:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)=[@sndinfo={0x1c}], 0x1c}, 0x0) [ 242.266776][T13766] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0xe6eb3e76b55f039e, 0x0) 07:15:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:18 executing program 0: r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x2c03d7f5a7d1faba, 0x0) preadv(r0, &(0x7f0000000400)=[{0x0}], 0x1000000000000388, 0x0, 0x0) [ 242.339851][T13766] bond18 (uninitialized): Released all slaves [ 242.416026][T13778] device veth79 entered promiscuous mode [ 242.454167][T13778] bond5: (slave veth79): Enslaving as an active interface with an up link 07:15:19 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) 07:15:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 07:15:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:19 executing program 0: mknod(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 07:15:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 07:15:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:15:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0\x00') rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') [ 242.726380][T13804] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xe7149f68835c2ff9, 0x0) 07:15:19 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0x8000, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 242.803354][T13804] bond18 (uninitialized): Released all slaves 07:15:19 executing program 0: mknod(&(0x7f0000000000)='./file0\x00', 0x8000, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 07:15:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = getpid() tkill(r1, 0x2f) [ 242.892610][T13811] device veth81 entered promiscuous mode [ 242.919452][T13811] bond5: (slave veth81): Enslaving as an active interface with an up link 07:15:19 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0xe6eb3e76b55f039e, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') 07:15:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 07:15:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8941, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:15:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = getpid() tkill(r1, 0x2f) 07:15:19 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0046686, 0x0) 07:15:19 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/user\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) [ 243.186011][T13836] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = getpid() tkill(r1, 0x2f) [ 243.244122][T13836] bond18 (uninitialized): Released all slaves 07:15:19 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x25, 0x0, 0x0) 07:15:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x48, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 07:15:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8937, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:19 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000500)=ANY=[]) [ 243.326829][T13845] device veth83 entered promiscuous mode [ 243.357110][T13845] bond5: (slave veth83): Enslaving as an active interface with an up link 07:15:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:20 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getpid() tkill(0x0, 0x2f) 07:15:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, @remote={0xfe, 0x45}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe501ea}) 07:15:20 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x5452, &(0x7f0000000040)={@local}) 07:15:20 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 07:15:20 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x7003, 0x0) 07:15:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x3c}}}, 0x1c, 0x0}, 0x0) 07:15:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x29, 0x3a, 0x0, 0x0) 07:15:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8935, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:15:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x3, 0x3, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x2]}, 0x40) 07:15:20 executing program 1: keyctl$link(0x5, 0x0, 0x0) 07:15:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xa}, 0x40) 07:15:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getpid() tkill(0x0, 0x2f) 07:15:23 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x300, 0x0) 07:15:23 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/key-users\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 07:15:23 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8995, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r2, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001540)={0x80, r1, 0x1, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x6c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x0, 0x1, @udp='udp:syz2\x00'}]}]}, 0x80}}, 0x0) [ 246.733220][T13928] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.4'. 07:15:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x1, &(0x7f00000000c0)=@framed={{}, [@call, @alu, @btf_id, @func, @initr0, @exit, @ldst, @ldst]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x47, 0x10, 0x0}, 0x78) 07:15:23 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8915, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:23 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8980, 0x0) [ 246.809875][T13942] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.4'. 07:15:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x3}, 0x40) 07:15:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:23 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x0, 0x130, 0x0, 0xffffffff, 0xffffffff, 0x368, 0x368, 0x368, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@mcast1, @private0, [], [], 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@local, @empty, [], [], 'ip6gre0\x00', 'syzkaller0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) 07:15:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getpid() tkill(0x0, 0x2f) 07:15:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}, 0x20000080) 07:15:26 executing program 2: syz_usb_connect$hid(0x0, 0x36, &(0x7f00000008c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x8, 0x5ac, 0x232, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000b00)={0x0, 0x0, 0x3a, &(0x7f0000000940)={0x5, 0xf, 0x3a, 0x5, [@generic={0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "a8a06fc334ee11b87d92ac0b5e41ac22"}, @ext_cap={0x7, 0x10, 0x2, 0xa}, @ptm_cap={0x3}, @ssp_cap={0x14, 0x10, 0xa, 0x0, 0x2, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}) 07:15:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x8e60, 0x0, 0x1}, 0x40) 07:15:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getroute={0x1c, 0x1a, 0x501}, 0x1c}}, 0x0) clock_gettime(0x0, &(0x7f0000001f40)) recvmmsg(r0, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/81, 0x51}}, {{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000000680)=""/203, 0xcb}, {&(0x7f0000000900)=""/164, 0xa4}, {&(0x7f00000009c0)=""/251, 0xfb}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/89, 0x59}], 0x5}}], 0x2, 0x0, 0x0) 07:15:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:26 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x7004, 0x0) 07:15:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@RTM_NEWNSID={0x1c, 0x58, 0x1, 0x0, 0x0, {}, [@NETNSA_NSID={0x8}]}, 0x1c}}, 0x0) 07:15:26 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x32, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x358, 0x108, 0x2f0, 0xffffffff, 0x218, 0x3d0, 0x3d0, 0x3d0, 0xffffffff, 0x3d0, 0x3d0, 0x5, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0x0, 'veth0_to_hsr\x00', 'geneve0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @local, @gre_key, @icmp_id}}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'caif0\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@loopback, @icmp_id, @icmp_id}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @rand_addr, @remote}}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv6=@dev}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) [ 249.990955][T14004] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 07:15:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x1, &(0x7f00000006c0)=@raw=[@generic], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x70, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:15:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a40)={0x2, 0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_ident={0x2, 0xb}, @sadb_key={0x1, 0x8}]}, 0x28}}, 0x4) [ 250.130765][ T9596] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 250.403070][ T9596] usb 3-1: Using ep0 maxpacket: 8 [ 250.639586][ T9596] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 250.849390][ T9596] usb 3-1: New USB device found, idVendor=05ac, idProduct=0232, bcdDevice= 0.40 [ 250.860638][ T9596] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 250.870478][ T9596] usb 3-1: Product: syz [ 250.874765][ T9596] usb 3-1: Manufacturer: syz [ 250.881586][ T9596] usb 3-1: SerialNumber: syz [ 250.947005][ T9596] usbhid 3-1:1.0: couldn't find an input interrupt endpoint [ 251.152867][ T19] usb 3-1: USB disconnect, device number 2 [ 251.938599][ T19] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 252.210237][ T19] usb 3-1: Using ep0 maxpacket: 8 [ 252.409242][ T19] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 252.600169][ T19] usb 3-1: New USB device found, idVendor=05ac, idProduct=0232, bcdDevice= 0.40 [ 252.609295][ T19] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 252.617295][ T19] usb 3-1: Product: syz [ 252.622899][ T19] usb 3-1: Manufacturer: syz [ 252.627492][ T19] usb 3-1: SerialNumber: syz [ 252.683897][ T19] usbhid 3-1:1.0: couldn't find an input interrupt endpoint [ 252.785737][ T19] usb 3-1: USB disconnect, device number 3 07:15:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x0) 07:15:29 executing program 1: add_key$fscrypt_v1(0x0, &(0x7f00000001c0)={'fscrypt:', @desc1='0000111122223333'}, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_GET_NEXT_ID(0x10, &(0x7f00000001c0), 0x8) 07:15:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x2, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:15:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:29 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x891f, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8910, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:29 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) statx(0xffffffffffffff9c, &(0x7f0000013080)='./file0\x00', 0x0, 0x0, &(0x7f00000130c0)) 07:15:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x5, &(0x7f00000000c0)={0x200}, 0x4) 07:15:29 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:15:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x2, 0x1, 0x0, [@private2]}}}], 0x28}, 0x0) 07:15:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:29 executing program 1: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0x80086603, 0x0) 07:15:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x0) 07:15:32 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f00000001c0)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000200)={0x0, "3244ec73422a1c45b7fbcccc86a7c340fccc76398b738cfd003e047d3fa8629cbdc00598a5cf4d3789e84a9e25be0304b32a053183e23a1ef950537dbb0a8032"}, 0x48, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x0) keyctl$KEYCTL_MOVE(0x7, r0, 0x0, 0x0, 0x0) 07:15:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8970, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:15:32 executing program 0: keyctl$link(0x7, 0x0, 0x0) 07:15:32 executing program 1: syz_emit_ethernet(0xfdef, &(0x7f00000001c0)={@broadcast, @empty, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, 'w.~', 0x8, 0x0, 0x0, @dev, @ipv4={[], [], @broadcast}, {[@srh={0x2f}]}}}}}, 0x0) 07:15:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:32 executing program 4: bpf$MAP_CREATE(0x8, &(0x7f00000000c0), 0x40) 07:15:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getroute={0x1c, 0x1a, 0x501, 0x0, 0x0, {0x2}}, 0x1c}}, 0x0) 07:15:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x20000288) 07:15:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x80000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) 07:15:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:32 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x77359400}, {r0, r1+10000000}}, 0x0) timer_gettime(0x0, &(0x7f0000000340)) 07:15:35 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x39, 0x0, 0x0) 07:15:35 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x11, 0x0, 0x0) 07:15:35 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 07:15:35 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5411, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:35 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x0) 07:15:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:35 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0x9, &(0x7f0000000040)={0x0, 0x0, 0x5}, 0xc) 07:15:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000000)={0x80, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 07:15:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x358, 0x108, 0x2f0, 0xffffffff, 0x218, 0x3d0, 0x3d0, 0x3d0, 0xffffffff, 0x3d0, 0x3d0, 0x8000000, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0x0, 'veth0_to_hsr\x00', 'geneve0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @local, @gre_key, @icmp_id}}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'caif0\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@loopback, @icmp_id, @icmp_id}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @rand_addr, @remote}}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv6=@dev}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 07:15:35 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, 0xfffffffffffffffd) 07:15:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@hoplimit_2292={{0x14}}, @flowinfo={{0x14, 0x29, 0x2}}], 0x30}, 0x0) 07:15:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:35 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2d, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x358, 0x108, 0x2f0, 0xffffffff, 0x218, 0x3d0, 0x3d0, 0x3d0, 0xffffffff, 0x3d0, 0x3d0, 0x5, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0x0, 'veth0_to_hsr\x00', 'geneve0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @local, @gre_key, @icmp_id}}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'caif0\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@loopback, @icmp_id, @icmp_id}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @rand_addr, @remote}}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv6=@dev}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 07:15:35 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89f0, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8934, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:15:36 executing program 4: r0 = fork() tkill(r0, 0x13) tkill(r0, 0x13) 07:15:38 executing program 4: r0 = socket(0x10, 0x2, 0x4) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 07:15:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='attr/exec\x00') write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@link_local, @empty, @void, {@x25}}}, 0x15) 07:15:38 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x12, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x358, 0x108, 0x2f0, 0xffffffff, 0x218, 0x3d0, 0x3d0, 0x3d0, 0xffffffff, 0x3d0, 0x3d0, 0x5, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0x0, 'veth0_to_hsr\x00', 'geneve0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @local, @gre_key, @icmp_id}}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'caif0\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@loopback, @icmp_id, @icmp_id}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @rand_addr, @remote}}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv6=@dev}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 07:15:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x894a, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:15:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:38 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000140)=@abs, 0x6e) 07:15:38 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 262.270503][T14285] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:38 executing program 2: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0x80087601, 0x0) 07:15:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5452, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:15:38 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8971, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:38 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:15:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x8919, &(0x7f0000000240)={0x0, @l2tp={0x2, 0x0, @private}, @l2tp={0x2, 0x0, @multicast1}, @xdp}) 07:15:39 executing program 1: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x2}, &(0x7f0000000100)={0x5}, 0x0, 0x0) 07:15:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8905, &(0x7f0000000000)={'batadv_slave_1\x00'}) [ 262.500804][T14306] tmpfs: Unknown parameter 'fscontext' [ 262.532182][T14306] tmpfs: Unknown parameter 'fscontext' 07:15:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:39 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000080)={0x0, "51a235a82508139e2a48e55667ffb64693bfac3aba637a10304afe57020731f591c0f97f8fdd80e217334bb18d173edc2593e3724030e3984a2f31eecbac126f"}, 0x48, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000080)={0x0, "51a235a82508139e2a48e55667ffb64693bfac3aba637a10304afe57020731f591c0f97f8fdd80e217334bb18d173edc2593e3724030e3984a2f31eecbac126f"}, 0x48, 0xfffffffffffffffd) r2 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000080)={0x0, "51a235a82508139e2a48e55667ffb64693bfac3aba637a10304afe57020731f591c0f97f8fdd80e217334bb18d173edc2593e3724030e3984a2f31eecbac126f"}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) 07:15:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000240)=0xffff, 0x4) 07:15:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x1, &(0x7f00000006c0)=@raw=[@generic], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:15:39 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x16, 0x0, 0x0, 0x0}, 0x20) [ 262.740592][T14320] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000b00)={0xfffffffffffffffd, 0x0, 0x0}, 0x0) 07:15:39 executing program 3: open$dir(&(0x7f0000000000)='./file1\x00', 0x48040, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xee01, 0x0, 0x0) 07:15:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@hoplimit_2292={{0x14}}], 0x18}, 0x7ffffff7) 07:15:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x3000000, 0x0, &(0x7f0000000080)={&(0x7f0000000a40)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 07:15:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x891f, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:15:39 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbaa42c6f2f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:15:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:39 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='maps\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000800)='hrtimer_expire_entry\x00', r0}, 0x10) 07:15:39 executing program 4: r0 = fork() process_vm_writev(r0, &(0x7f0000002780)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1, &(0x7f0000002640)=[{&(0x7f0000001640)=""/4096, 0x7ffff000}], 0x1, 0x0) 07:15:39 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "78ed49672ae086a2cbc103168f7372a8bc67d28ef611c5a2f1780c534ade81ea6965d663b2a009f7ef21543844a99b0f92050ced1b97fc2327a0b3f67991d680"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x6, r0, 0xfffffffffffffffb) 07:15:39 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x8, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:15:39 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0x5460, 0x0) [ 263.179709][T14357] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@mcast2, @mcast2, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}) 07:15:39 executing program 2: setuid(0xee01) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 07:15:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x42, &(0x7f00000000c0), 0x4) [ 263.449017][ T24] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 07:15:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x2, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@hoplimit_2292={{0xf}}, @flowinfo={{0x14}}], 0x30}, 0x0) 07:15:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:40 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={0x0}}, 0x0) 07:15:40 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x20710c2, &(0x7f0000000500)=ANY=[]) [ 263.592362][T14390] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x3, 0x3, 0xff02}, 0x40) 07:15:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, 0xfffffffffffffffd) 07:15:40 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) 07:15:40 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x4, 0x0, 0x0) 07:15:40 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89b0, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000600)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xffffffff, 0xe8, 0x200, 0xe8, 0xffffffff, 0xffffffff, 0x388, 0x388, 0x388, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'geneve0\x00', {}, {}, 0x0, 0x0, 0x0, 0xe0}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "cc1568318df4b6e88568d91100bfb1731f9115157eadd0788061dd6b80f7"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 07:15:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:40 executing program 0: socket$inet6(0x10, 0x0, 0x12) 07:15:40 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0x40086604, 0x0) [ 264.044595][T14420] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:40 executing program 0: r0 = fork() tkill(r0, 0x13) tkill(r0, 0x2) tkill(r0, 0x12) 07:15:40 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vcsa\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000002300)={0x9}, 0x0, 0x0) read$FUSE(r0, &(0x7f0000002340)={0x2020}, 0x2020) 07:15:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x0, 0x200}, 0x40) [ 264.120444][T14425] EXT4-fs warning (device sda1): __ext4_ioctl:882: Setting inode version is not supported with metadata_csum enabled. 07:15:42 executing program 3: syz_emit_ethernet(0x3a, &(0x7f0000000140)={@broadcast, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x11, 0x0, @broadcast=0xd, @dev}, {0x0, 0x0, 0x18, 0x0, @wg=@data}}}}}, 0x0) 07:15:42 executing program 4: socketpair(0x10, 0x0, 0x4, &(0x7f0000000280)) 07:15:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@mcast2={0xff, 0x4}, @mcast2, @dev, 0x0, 0xf, 0x0, 0x0, 0x0, 0x201}) 07:15:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8912, 0x0) 07:15:42 executing program 0: syz_usb_connect$cdc_ncm(0x0, 0xa1, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x8f, 0x2, 0x1, 0x3f, 0x10, 0x3, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "f6ab618aff51"}, {0x5, 0x24, 0x0, 0x1000}, {0xd, 0x24, 0xf, 0x1, 0x9d53, 0x1f, 0x1000, 0x73}, {0x6, 0x24, 0x1a, 0x0, 0x1e}, [@mbim_extended={0x8, 0x24, 0x1c, 0x4, 0x7}, @country_functional={0xe, 0x24, 0x7, 0x3f, 0x0, [0x5, 0x9, 0x0, 0x80]}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0x7d, 0x7e4a}, @network_terminal={0x7, 0x24, 0xa, 0x3, 0x0, 0x1f, 0xfb}, @mbim_extended={0x8, 0x24, 0x1c, 0x8, 0x0, 0x9}]}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x3, 0x3}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x7, 0x1f}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0xc, 0x5, 0x6}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x110, 0x0, 0x80, 0x2, 0x50}, 0x9c, &(0x7f0000000180)={0x5, 0xf, 0x9c, 0x5, [@wireless={0xb, 0x10, 0x1, 0x0, 0x4f, 0x81, 0xe1, 0x1000}, @generic={0x6a, 0x10, 0x1, "6ca92cdc37b01c6d531abdf6fe484ab60131dcfd3611b2b6907c33221abfb994538e4057401ad0a349c41a68226a5d0904585261ed37db10094fd1477d1966fc36b169ead54a6b0d80524199f48b6ab2b63151b05b58868eb6efef57e830c10d94f475dfe3e75a"}, @ss_container_id={0x14, 0x10, 0x4, 0x1b, "64120d8889090020ede4369da2d14e86"}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x0, 0x4, 0x6}, @ext_cap={0x7, 0x10, 0x2, 0x8, 0x3, 0x3}]}, 0x4, [{0x1c, &(0x7f0000000240)=@string={0x1c, 0x3, "25b3950f698a838158999a4ad0cf85c976506690c813bee1c4cf"}}, {0x0, 0x0}, {0x2, &(0x7f0000000300)=@string={0x2}}, {0x0, 0x0}]}) [ 266.248086][T14465] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:42 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5411, 0x0) 07:15:42 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:15:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x13}, 0x40) 07:15:42 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8946, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:43 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) waitid(0x2, r1, 0x0, 0x8, 0x0) 07:15:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x1, &(0x7f00000006c0)=@raw=[@generic={0x18}], &(0x7f0000000740)='syzkaller\x00', 0x2, 0x87, &(0x7f0000000780)=""/135, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:15:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89b1, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:15:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c00"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8955, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:15:43 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) 07:15:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8929, &(0x7f0000000000)={'batadv_slave_1\x00'}) [ 266.956888][ T19] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 267.208285][ T19] usb 1-1: Using ep0 maxpacket: 16 [ 267.366126][ T19] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1023 [ 267.376337][ T19] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 8 [ 267.977402][ T19] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 267.986532][ T19] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 268.338001][ T19] cdc_ncm 1-1:1.0: bind() failure [ 268.346321][ T19] cdc_ncm 1-1:1.1: bind() failure [ 268.357029][ T19] usb 1-1: USB disconnect, device number 2 [ 269.046673][ T9596] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 269.336638][ T9596] usb 1-1: Using ep0 maxpacket: 16 [ 269.457496][ T9596] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1023 [ 269.467672][ T9596] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 8 07:15:46 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000001c0)={'wg0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@private1, @mcast2, @private1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, r2}) 07:15:46 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5411, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:46 executing program 1: syz_usb_connect$hid(0x0, 0x36, &(0x7f00000008c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x8, 0x5ac, 0x232, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000b00)={0x0, 0x0, 0xa8, &(0x7f0000000940)={0x5, 0xf, 0xa8, 0x3, [@generic={0x88, 0x10, 0xa, "ad3ebbc28d2db71a440cd3c159b617e7c729d3c75a4f045160903c980654484bd8578f8d264cec9093886dfa5d809a606d65a316924de20f922a22f0ebf1812e2924e5ed1d64f05f77ca4bca2489ab3c1f15504f397cc5a7f120531d41cae850d0d2efad3a668e8846afcc7d3add06eaeb658c509fc73b430d2e49483e1013dd420be83fba"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "a8a06fc334ee11b87d92ac0b5e41ac22"}, @ext_cap={0x7, 0x10, 0x2, 0xa}]}}) 07:15:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001740)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}}}, 0xe8) sendmsg$inet6(r0, &(0x7f0000001580)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @private1}, 0x1c, 0x0}, 0x0) 07:15:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c00"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0), 0x4) [ 269.746637][ T9596] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 269.755811][ T9596] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 07:15:46 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 07:15:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0}, 0x7ffffff7) 07:15:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000240), 0x4) [ 269.829629][ T9596] usb 1-1: can't set config #1, error -71 [ 269.853985][ T9596] usb 1-1: USB disconnect, device number 3 07:15:46 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@private1, @mcast2, @private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 07:15:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@mcast2={0xff, 0x5}, @mcast2, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}) 07:15:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c00"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x89a0, &(0x7f0000000240)={0x0, @l2tp={0x2, 0x0, @private}, @l2tp={0x2, 0x0, @multicast1}, @xdp}) [ 270.066559][ T9595] usb 2-1: new high-speed USB device number 2 using dummy_hcd 07:15:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x339}]}, 0x24}}, 0x0) [ 270.316488][ T9595] usb 2-1: Using ep0 maxpacket: 8 [ 270.517141][ T9595] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 270.727348][ T9595] usb 2-1: New USB device found, idVendor=05ac, idProduct=0232, bcdDevice= 0.40 [ 270.740069][ T9595] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 270.758318][ T9595] usb 2-1: Product: syz [ 270.762594][ T9595] usb 2-1: Manufacturer: syz [ 270.769104][ T9595] usb 2-1: SerialNumber: syz [ 270.829167][ T9595] usbhid 2-1:1.0: couldn't find an input interrupt endpoint [ 271.032972][ T5] usb 2-1: USB disconnect, device number 2 [ 271.806317][ T8976] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 272.046434][ T8976] usb 2-1: Using ep0 maxpacket: 8 [ 272.256315][ T8976] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 272.426733][ T8976] usb 2-1: New USB device found, idVendor=05ac, idProduct=0232, bcdDevice= 0.40 [ 272.435784][ T8976] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 272.452288][ T8976] usb 2-1: Product: syz [ 272.459207][ T8976] usb 2-1: Manufacturer: syz [ 272.463823][ T8976] usb 2-1: SerialNumber: syz [ 272.509674][ T8976] usbhid 2-1:1.0: couldn't find an input interrupt endpoint 07:15:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/current\x00') read$FUSE(r0, 0x0, 0x0) 07:15:49 executing program 4: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000004c80)='cgroup.max.descendants\x00', 0x2, 0x0) getresgid(&(0x7f0000004d40), 0xfffffffffffffffd, 0x0) 07:15:49 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0) 07:15:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8954, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:15:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@tclass={{0x14}}, @hopopts={{0x18}}], 0x30}, 0x0) 07:15:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c0001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) [ 272.724620][ T8976] usb 2-1: USB disconnect, device number 3 [ 272.801340][T14640] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:49 executing program 3: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0}, 0x20) 07:15:49 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x29, 0x1b, 0x0, 0x0) 07:15:49 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@hoplimit_2292={{0x14}}, @dstopts_2292={{0x18, 0x29, 0x6}}], 0x30}, 0x0) 07:15:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, @remote}) 07:15:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c0001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@hoplimit_2292={{0x14, 0x29, 0x9}}], 0x18}, 0x0) 07:15:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) 07:15:49 executing program 2: syz_usb_connect$hid(0x0, 0x36, &(0x7f00000008c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x8, 0x5ac, 0x232, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000b00)={0x0, 0x0, 0xbf, &(0x7f0000000940)={0x5, 0xf, 0xbf, 0x5, [@generic={0x88, 0x10, 0xa, "ad3ebbc28d2db71a440cd3c159b617e7c729d3c75a4f045160903c980654484bd8578f8d264cec9093886dfa5d809a606d65a316924de20f922a22f0ebf1812e2924e5ed1d64f05f77ca4bca2489ab3c1f15504f397cc5a7f120531d41cae850d0d2efad3a668e8846afcc7d3add06eaeb658c509fc73b430d2e49483e1013dd420be83fba"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "a8a06fc334ee11b87d92ac0b5e41ac22"}, @ext_cap={0x7}, @ptm_cap={0x3}, @ssp_cap={0x14, 0x10, 0xa, 0x0, 0x2, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}) 07:15:49 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xd, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x358, 0x108, 0x2f0, 0xffffffff, 0x218, 0x3d0, 0x3d0, 0x3d0, 0xffffffff, 0x3d0, 0x3d0, 0x5, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0x0, 'veth0_to_hsr\x00', 'geneve0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @local, @gre_key, @icmp_id}}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'caif0\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@loopback, @icmp_id, @icmp_id}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @rand_addr, @remote}}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv6=@dev}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) [ 273.157522][T14669] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@hoplimit_2292={{0x14}}, @flowinfo={{0x14, 0x29, 0x34}}], 0x30}, 0x0) 07:15:49 executing program 3: modify_ldt$write(0x1, &(0x7f0000000340)={0x7ff}, 0x10) modify_ldt$write(0x1, &(0x7f0000000000), 0x10) 07:15:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x8901, &(0x7f0000000100)={@loopback={0x8000000000}, @local, @dev}) 07:15:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f00000000c0)={'erspan0\x00', 0x0, 0x0, 0x7800, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @broadcast}}}}) 07:15:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c0001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:49 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x4002, 0x0) 07:15:49 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x4, 0x2d0, 0xffffffff, 0x1c8, 0xf8, 0x1c8, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @multicast2, 0x0, 0x0, 'bond0\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth0_virt_wifi\x00', 'wlan1\x00', {}, {}, 0x0, 0x0, 0x84}, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@private}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x330) 07:15:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='attr/exec\x00') write$tun(r0, 0x0, 0x0) [ 273.496521][ T9596] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 273.520643][T14697] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:50 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0x40286608, 0x0) 07:15:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@loopback={0xe0ffffff00000000}, @local, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400102}) [ 273.746105][ T9596] usb 3-1: Using ep0 maxpacket: 8 [ 273.986836][ T9596] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 274.207096][ T9596] usb 3-1: New USB device found, idVendor=05ac, idProduct=0232, bcdDevice= 0.40 [ 274.226088][ T9596] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 274.234291][ T9596] usb 3-1: Product: syz [ 274.240277][ T9596] usb 3-1: Manufacturer: syz [ 274.244959][ T9596] usb 3-1: SerialNumber: syz [ 274.298833][ T9596] usbhid 3-1:1.0: couldn't find an input interrupt endpoint [ 274.503148][ T9596] usb 3-1: USB disconnect, device number 4 [ 275.295977][ T9595] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 275.566186][ T9595] usb 3-1: Using ep0 maxpacket: 8 [ 275.786031][ T9595] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 275.965961][ T9595] usb 3-1: New USB device found, idVendor=05ac, idProduct=0232, bcdDevice= 0.40 [ 275.975125][ T9595] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 275.983820][ T9595] usb 3-1: Product: syz [ 275.988152][ T9595] usb 3-1: Manufacturer: syz [ 275.992905][ T9595] usb 3-1: SerialNumber: syz [ 276.038715][ T9595] usbhid 3-1:1.0: couldn't find an input interrupt endpoint 07:15:52 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000023c0)={&(0x7f00000000c0)=@name, 0x10, &(0x7f0000002300)=[{&(0x7f0000000100)="42fb34875a58edaddd83e87a5b61171291f7bd8fb7ec33dd098c3bcad086dda2c45ebfe14e35863336151203c1f111ae19f6e40bd8a2d6911d5b8c04e8d082a871f8ed0e8412c35221bd1cc61e4419a4fba8f26a77467173818fdf095d4a4a07c4e727dda1a31f00f3ad4347104a0f18b7c432c27c8284bb80a172d80580d62c7f539191594eb284b0c893622b0ea37d246afbf87a91e3584681d4eee37c70afda74b133ec3445238191c9627ee41ca44c427a7cb65baebf22d942afd1dafe44782120e69cc64bd45b172514e39ef744de48880e626db417931a58aaf9b7473d7f22256d7fa086939e5f8e5f55dd394c35b7ea7a7acda9cb6e774815acf2232a47dc8b14f3e38f94619629d056bcae5e14e05ac21e617ab921e3b7dd56179d882c2d7790b9c0f3328b8d2be19c2b14004ebbccb37c3ae9c000d15bb114a948b752ee5a582539787eb575359c4d2b1b4df5a978d187a705b00450c51d5bb403c39ffec4077f3734ef8c0909c2248d23a926731a3133144b3d0d0622219132cbb414d80548ffd69fbbd74e3a091a7327f63435fe0c9ff8fa43e1dd05383f655b740127959bcfda0dcf5745bc68704a18e8f731fee84d800904ef5323e48aaefb3cf64e6e63fc79eac032e7e15566bc1dcc848af407e7ea7e694c8dcfcab92eb35984b2d3f0303672a21aa00eb8c6d413b44920a91d6d4e4f4ba432956ff17983fc90eb54568596aaee27e710e467378a36dd894dba3cada19336792f2faf738bacdac17eae3ae1ac22b3fd859684d29a49cc419ed080ef9b28ca7e002a383d41a4bd684d2882fc916509fd7d16013eed39085740fcbfec2d3a4b34e93babd23b5e482a31d3297454e233eccb217f72c795bb5c8d7cf4b3153e7bc7d4d9480230e707e5556966ba488253200ae413a2e1e5abf8e3deebd667bd17645223da9c1c98ef2243821f624a1b00fea4237d590a561cf4910ce1414d8e5e374e19b3bb52dccf1f0ea08b6c80fcb2339a332f99c6b3012910eae680346a62a5c0e7d63de89c1f151c4d56996f2e32dfeffbd95cabd8c37fab4e82138eb823ee8ff1343683ee29fa549651b272d0dc6e9513540d1dcf3e0b670ab23455cdc76996e2bf657c0257fe70ea808782fcaa5b8d13cea6b76af563cfe01ceff83f3d0ca77e4ecb10196cf2ae1d710682398859dd55087189775ca7e3c7f52bc7ffdd5212290825683415936b33e04e818fd1750440f75a30503fa2ec4f35a42d76c6eaca21381dfbf4c232ec463ce8e5a0cba7a870055c027ea3d498d1a3507a4953afd11e8e5b5a33d30651091864541d334c00a04ef5e9124267f3cb2925124f6bc61cffd8801da955e0fc11441530da9867f973a7d6647850ea5042b5d7aa8e02d4542c66fb4eda8b067210c0853c0cb89caeda5afd341dd11e22bb4651dc500b37182f6135d1adff591a7b288fe3e5fde056003b4c1f7b1f28e2a1175ab76124ff531fc14f4a141ead6e63849cf488b5a8bffd9fdc31008d4b0557d4fef0ce897a26464282003b1cc854ff178e9112e04bc46e536280593a150f1b6cc052276c1dc9cece8b6d1a62b0fd685da019eee6ed377a61935b46bd624da8e181e2b70800a5b4b383070b11bd512730e2c7e1734b814ef4d366c73560036c36d811b01ecbd2e0ae4701bfe7f1fc1bcd35b58346d1c5d35d7b95628a130210f6469fa0521c87ac728954323c733b1d3f7e07463c37e79b729f15d805e25cf1c45953aca16c414275d7be6c5ea554b7fcfd59fdae0cb968ce47e0fad36fe45ee6284353700bc088767796233f15a0411e906cdd4faf5b95886b8beda29165fbbc761e411d4cf909bb8e28ee9a2ec86e0d97566994bf3382b987034c3e2f9854e4b906572d758f953b87795116a9995cf1432d22ae7975ffa3ed5ac4bbc817d713a547b5006f3cf8a4d750a9548eac61cede912e9502311ddcec5bac25cabbaf9cb36ee1587dd0f6dfdd95b2442d4ccd30637e8d139614735a6bedfc6fe19e6d16282204ed1bcad01a04edd3b9e47e7473b911990afb21da5237bf5d67cab8f246953492d659fbcef8c5afabf5f647e35f77d57015575d7f06a3da93d528c370c26df4ce31065820b86d93d70bf22999d9aafa1f5449dc479f78556140f776f8077747adac802b47c4297ab4002478fcc23b4676a070ab0e7e6089d88b33e0ca6630dfd8a36baf3415a514e1ce9fa2aa11ed50b6a917c0a0e0200779d9eb717d46b726593ee9eb997e08628e52b03f59da20c5bff4dc50ea936fa54a6f3865dfadce94385ac6a8d734749b591dd5433f67f78b4595576f7845c35270d1372fc3bc8540b52ee921f26d27017959942e404b913c2489177b6fd211de23fe4a8421cc2131070839dc56f65aa60ac4c3e0b5fca83b024fb1891d329a5e27e9c900ea35c5e17eb7d3caf066c052210e6432169360831b800dd35c62530c6d0e439f2864422fde71ba0b11020daeeb51264ff452894f671ab2544df41f35c9380e5e6071ea5b19ea262a8a8ea1383c533d12442dbdfb8d7e725488c25a8b05c703356e4262dc9893281d1d98d293c64cc65120486e771b0f8b0621d32b7d1ac32b9066036599f222eb5936779e8c651e2ea26e7aa0b5d566f752bae05e0235fd370f26811d7435cab464c7612a93e560107a836f1aabe4e8b65b3042c0623eea83d100b68538a8918f612b066eb2ed9f99a63d5b13eed575616cdb7a70733fa8f1e912fa52e9699919adb6f74b62f4cd97a77665f944e0807e398044501e61d2db9af45b435d3b728caa2ef48344b2b5952bcec9c6f47780e8f0a6ddc16c77ecca13cfca0241dc985104b23af806519a5b11cf8ce2cf4274852e667cef0a1dccf094661c758e3c82e4836f51e1f3efadb682d219838465140c017dc24dff9f070c3059d96150d1e77a414c4e720581fb0fe695e618d3f1eff0a824c0726668ef1036138e3c3da82168acbf8f6703880cedc56a11fd84ed3cff32f8aecd00cd5d9526a9e5c24e6156913f16e35b12035a7633d162c89415a675c3e227eb031e1941dae1b44ff34f4f98eb71d657a131dd8d2de2ed073be2bf522f414b0ee78cd81016ecf5826c2dbe61fbeae3dcffc5f0e84ac433bf12dd45ea0340259c96d22c32765544fa329fa629556ef5e0a93c37161b01ebe689f293e204f0f246f316e9e559e754097c2360a2db5ecdde3bc60c1a0b5f610626cbf313c0d6c3181b049c1f7cddf1beead77c51db24c123facfe1ada6900e5877ddee0c01b509af09dcb8aea1b898fa023c38dffc673d146f0d043922c3ba5d7dd0dfbad6a39f5adf13c59a374ad715f644acfb02aa326f5eb88e3f04899ddda3575a76b6a0dfc4303b976b4d36556c166e14678ac199e70a530a70da5366e050cdd3aa1a02706f60da0690e576343e61273dc3935cb5bab24fe46a6222502b6b02da56b9bf9c5471655c6df3314787f95ece1988a7dfd77406ba7b7e918daa57d324111bdc49e612fdfcff0fcce2a7f5dc92aab1656ab981f6e2a7b5e66fefde1b56025a972f581e94bf0816d287248f1b81f40d0b5ea43393af8f23b4fa42dff284cc7d55ce401ee3b8f52d05b14a70c0e4a0cab722260ce89b4395e2d7359e6b55b5d12074e085ccab7ba201d46b94ea6a993af5394e62bf71e37c6a7f8d7183252985d928aa8c5bd81809edc5fb391622e36d119ba5ab7a6ed66ac42da7576acada617f9a3c8d2ba922a521fe2b1a263cdee50782d3b3def21a3d67badad12b7a15e44c0e9986115f3ac9b3b5b6b2374715f6687475f15ce9ec25cb8f07305118e6e854cf1c23a15f1a7ef15e8dd38c6b871649269fdd7e5321d8052ecb75365d00123775dfa5d19be0246454db0cae646427fe375ce96d7330d1719576bc9b52568dd9516ed79a38bc886a35623e2db3417330efd189fb21edea04dac2074f6db135591946310ca3c67c193667709e5380b66132cd060fcc02b960c4c328b6aae7e1f054b8f8391a1198d9dc0ad54495ab24c7001e1cbce2c67d8ee85d5e27cc6f892c3c2c644ba4cacbd174fbb0d125008753b863709876e3776af4ecc62d29e2ba3129b7a9489aebb45b82187ed4bba6ff22a2950b6fd94fb3b479760909333e93efb78caf6c8c93d2d661bd160a0b777c22617da68a4b82fe8311328792f21eb896c25389b6f72137fce0854cdc4c1b901ac42ed5b1e064a41bce02e52e032128f60d57db74e9a1582d71453a899de8c1ac1e7f32af4275348b45a4a9e0587f66986d9836f0fd58a706b0f69efa5fe6b2429403bdbb059aded895a06519846d0010846036e669151e328bd421d668f55915318e4cec8722580ac48e3a95af6e5c004845ca030fdccf9b08b9a0ba605b4d4ba9d5afdae0d0f708c9ba252b46ef42531f1eb2dcc4f99904b37778e01cda7ae7d170c013dbc87fc51453ee349ea3565694d747288ea3e829b564acabcdf49adc58369f458b2fcd8c912084d4898dc673022761b6eb7b5088200d6073a26d33cc3d194b204f09fe5163d3403b339050a5ccedd87fa3546fc47f4a48a9765f2f543c6ecef78c61e565a338f016b7ad9a2b5652597ed48685a246e929210ce929aac9c135ce8e270813074271b59e8134d045a59091ea0c29e942f8dbf0f54fe7da0e5ef520dc2223360de047b6e0473b815fb7a41dd6838b3c66682dd1a09ab627b061de8a07421a4dfe010a7fd67a2dcef4d65fe7ccac87ade5d03c9ff9d76d945c31b33e34e04e6411c455f310ed349eb98070e797693a2c6b08e8d96dba1f3124a91ad4c9affd73c7bbc6e6915233942e037c63da58e1b62d84f141b5550489239be6142b4703adeddd1a5693aee4ef955070ba562409a9966664197fae55c6921ee4447d680a38e67e352de22b9a70f9a165f0eb1ada724d13a5663cbbe409083d864f621abf63b04677728c3091590be6b668e241bd687e220cabbcb6d03cc162c132cd883afe184ff25c5fa0d8e137782dc26160fd6ad11e4d7c2c1ba4964eec2fdc14e9903a1bca8ace0eaee5aa2e9715ec42141f04bc59bd93d17162ffaf346985817a9f5a3f4b9730f3c891c37e8bd5c82b606f8b92388aa76798264b4e2786a15d0038cc518fb1951e5f6fda2d9321b096dce7fe5aafbfb5d9c330c8a1773c76827542d0cdd0216d466dcaa4925b8f84e9e7e18948e8912edcea6764227aef04863362a5446819a0b011554cceee9ef5f0fbe20c678e987bb2e0fa8dc5442b518b4e2cd364bc91ab08c20175e544faa93d176dbdb05e5e51075d136be0b9b541b86be0eec63b484309921178e0506514f24b4475c85df14566270de990ab2b4298b0cd4e8802f795398229d2642218acae1e105a0b79c395c9936d16fb82997ccc5fb1613d1159810d7dc07084266bd33083ad0f856474012d3e032219fd8fa14e2879c33cac7074416b9db95109b23d0b071de644686da4191c735a84b35964ef347377ce04ee29299c696bf0deb971ae86ea7bc52d7fa7e4063a7e3922b3fed3ba13f4dfa2669ffd15459080469512f90eb2a839faa2c208fc957a0571e597c60434df8a526868a909b95c3a8262bbb00de04876810812771da5b17e822dd3d63e60f4d0bc81a968e67eb40e352cc2bac67b97db4d95fe6528f4251eff19c4583a8b34787644f0a33af2416e5d1d909999210d73b77cfd980e1b3513c665915bf6f83152e3b485f44a16a23900668166a15963b4ec1b77448f49bbf148679614b956f7d941a6a5c1630466b760728597a7d2ff74e377953cf186c9ad0a76ce", 0x20001100}, {&(0x7f0000002400)="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", 0x20c}, {&(0x7f0000001240)="ad817706563892ae03d4cfe5206da12bf07896983abd2681284e6a6619131f68193165b0bc48433c283fa827ba3312fd22b05a18f9dede91ae54e40c8134beeb9ed7a011aff9cc8e61b108f92d6c2f421b764ddc56ef9d8e99043eb7dec3f3eb51084d476ab95129cc59ebc966a5f05e1e8bb6fb7bbe1177a4ae1866fe7726d71eab7fad5a627445b2fff445c6603f29456bad5ecc073e246c6a3b45e63e31d246a764a0", 0xa4}, {&(0x7f0000001300)="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", 0xb59}], 0x4}, 0x0) 07:15:52 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000080), 0x20000090) 07:15:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@loopback={0x8000000000000000}, @local, @dev}) 07:15:52 executing program 4: syz_usb_connect$hid(0x0, 0x36, &(0x7f00000008c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x8, 0x5ac, 0x232, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000b00)={0x0, 0x0, 0x2d, &(0x7f0000000940)={0x5, 0xf, 0x2d, 0x2, [@generic={0x14, 0x10, 0xa, "ad3ebbc28d2db71a440cd3c159b617e7c7"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "a8a06fc334ee11b87d92ac0b5e41ac22"}]}}) 07:15:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001740)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x29, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}}}, 0xe8) sendmsg$inet6(r0, &(0x7f0000001580)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @private1}, 0x1c, 0x0}, 0x0) [ 276.184469][ T9595] usb 3-1: USB disconnect, device number 5 [ 276.270889][T14759] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:52 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000005f40)='net/sockstat\x00') 07:15:52 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2d, 0x0, 0x0) 07:15:52 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af00, &(0x7f0000000100)={@my=0x0}) 07:15:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000180)={0x1f, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 07:15:53 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vcsa\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0x11, 0x0, 0x0, 0x0}, 0x20) 07:15:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x8, 0x1f}, 0x40) 07:15:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:53 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) [ 276.567244][ T9596] usb 5-1: new high-speed USB device number 2 using dummy_hcd 07:15:53 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vcs\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, &(0x7f0000000200)={0x9}, 0x0, 0x0) 07:15:53 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0x9, &(0x7f0000000040)={0x0, 0x0, 0x300}, 0xc) [ 276.694228][T14795] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 276.835908][ T9596] usb 5-1: Using ep0 maxpacket: 8 [ 277.035839][ T9596] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 277.216459][ T9596] usb 5-1: New USB device found, idVendor=05ac, idProduct=0232, bcdDevice= 0.40 [ 277.225543][ T9596] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 277.248234][ T9596] usb 5-1: Product: syz [ 277.252426][ T9596] usb 5-1: Manufacturer: syz [ 277.275737][ T9596] usb 5-1: SerialNumber: syz [ 277.329873][ T9596] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 277.535227][ T19] usb 5-1: USB disconnect, device number 2 [ 278.315810][ T2943] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 278.555638][ T2943] usb 5-1: Using ep0 maxpacket: 8 [ 278.755695][ T2943] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 278.927303][ T2943] usb 5-1: New USB device found, idVendor=05ac, idProduct=0232, bcdDevice= 0.40 [ 278.936450][ T2943] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 278.944524][ T2943] usb 5-1: Product: syz [ 278.950116][ T2943] usb 5-1: Manufacturer: syz [ 278.954714][ T2943] usb 5-1: SerialNumber: syz [ 279.008217][ T2943] usbhid 5-1:1.0: couldn't find an input interrupt endpoint 07:15:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getroute={0x1c, 0x1a, 0x501}, 0x1c}}, 0x0) clock_gettime(0x0, &(0x7f0000001f40)) recvmmsg(r0, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000001b40)=[{0x0}, {0x0}, {&(0x7f0000001ac0)=""/89, 0x59}], 0x3}}], 0x1, 0x0, 0x0) 07:15:55 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0x801c581f, 0x0) 07:15:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@dstopts_2292={{0x18, 0x29, 0x3b}}, @tclass={{0x14}}], 0x30}, 0x0) 07:15:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@hoplimit_2292={{0x14}}, @flowinfo={{0x14, 0x29, 0x5}}], 0x30}, 0x0) 07:15:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:55 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x3938700}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f00000005c0)) [ 279.219092][ T9596] usb 5-1: USB disconnect, device number 3 [ 279.324868][T14848] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000015c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "2f9533dc05e3e3bc25f5aa9f8e9f7f2d455db97457fb6770b2244bb3e14137ea5a184a94300f42139eeca16d7493f96830c63e925fe260d5dbab42412306b0c0", "df01fcfce445a9412ebd10d673f3cca1792aeab62a105f93076b45f06191ee03"}) 07:15:55 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x1, 0x2000, 0x50, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 07:15:55 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xb, 0x0, 0x0) 07:15:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="46eae3b27ec71116ea6533bd154bac574b2017fa6859277c1502625811419ecbf154b64781bb4f8423", &(0x7f0000000040)=@tcp}, 0x20) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1}, 0x10) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000280)={'NETMAP\x00'}, &(0x7f00000002c0)=0x1e) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000001c0)={'wg0\x00', 0x0}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@private2={0xfc, 0x2, [], 0x1}, @mcast2, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0xe501ea, r2}) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000500)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$BLKSECTGET(r3, 0x1267, 0x0) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000200), &(0x7f0000000240)=0x4) 07:15:56 executing program 4: add_key$user(&(0x7f0000000080)='user\x00', 0x0, 0x0, 0xffff0f00, 0xfffffffffffffff9) 07:15:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000540)={&(0x7f0000000040)={0x2, 0x4e21, @multicast1=0xe0000002}, 0x10, 0x0, 0x0, &(0x7f0000000480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}], 0x20}, 0x0) 07:15:56 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') read$FUSE(r0, 0x0, 0x0) 07:15:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x894b, 0x0) 07:15:56 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x9, 0x0, 0x0) [ 279.726471][T14884] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:56 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x27, 0x0, 0x0) 07:15:56 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x4000, 0x0) 07:15:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000001c0)={'wg0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, @remote, 0x4, 0x0, 0x0, 0x0, 0x0, 0xe501ea, r2}) 07:15:56 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0x6609, 0x0) 07:15:56 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8919, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 07:15:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x31, &(0x7f00000000c0), 0x4) 07:15:56 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0x12, 0x0, 0x0) 07:15:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:56 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x21, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x358, 0x108, 0x2f0, 0xffffffff, 0x218, 0x3d0, 0x3d0, 0x3d0, 0xffffffff, 0x3d0, 0x3d0, 0x5, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0x0, 'veth0_to_hsr\x00', 'geneve0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @local, @gre_key, @icmp_id}}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'caif0\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@loopback, @icmp_id, @icmp_id}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @rand_addr, @remote}}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv6=@dev}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 07:15:56 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xa, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x358, 0x108, 0x2f0, 0xffffffff, 0x218, 0x3d0, 0x3d0, 0x3d0, 0xffffffff, 0x3d0, 0x3d0, 0x5, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0x0, 'veth0_to_hsr\x00', 'geneve0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @local, @gre_key, @icmp_id}}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'caif0\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@loopback, @icmp_id, @icmp_id}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @rand_addr, @remote}}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv6=@dev}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 07:15:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8903, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:15:56 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r0}, 0xc) [ 280.207796][T14920] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001540)={0x80, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x6c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x4, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x0, 0x1, @udp='udp:syz2\x00'}]}]}, 0x80}}, 0x0) 07:15:56 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:15:56 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x41, 0x0, 0x0) 07:15:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xd, 0x0, 0x4}, 0x40) 07:15:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x9, 0x3, 0x3e8, 0x0, 0xffffffff, 0xffffffff, 0x208, 0xffffffff, 0x340, 0xffffffff, 0xffffffff, 0x340, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x1e0, 0x208, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@mcast2, @local, @rand_addr=' \x01\x00', @mcast2, @remote, @private2, @dev, @mcast1, @private2, @empty, @private1, @private0, @loopback, @ipv4={[], [], @local}, @private1, @private0]}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@ipv6={@local, @loopback, [], [], 'bond_slave_0\x00', 'caif0\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x448) [ 280.402112][T14943] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. 07:15:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) [ 280.480463][T14943] tipc: Enabling of bearer rejected, failed to enable media [ 280.536857][T14948] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. 07:15:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@setneightbl={0x1c, 0x43, 0x1, 0x0, 0x0, {0x7}, [@NDTA_NAME={0x8, 0x1, '^%\\\x00'}]}, 0x1c}}, 0x0) [ 280.581953][T14948] tipc: Enabling of bearer rejected, failed to enable media 07:15:57 executing program 2: timer_create(0xa4ed604a91e6e17d, 0x0, &(0x7f0000000300)) 07:15:57 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) 07:15:57 executing program 0: syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x1, 0x120200) [ 280.624261][T14954] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:57 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f00000008c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x8, 0x5ac, 0x232, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000b00)={0x0, 0x0, 0x26, &(0x7f0000000940)={0x5, 0xf, 0x26, 0x4, [@generic={0x3}, @ext_cap={0x7}, @ptm_cap={0x3}, @ssp_cap={0x14, 0x10, 0xa, 0x0, 0x2, 0x0, 0x0, 0x0, [0x0, 0x0]}]}}) 07:15:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3400000013f2ff"], 0x34}}, 0x0) 07:15:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000040)=@raw=[@exit, @func], &(0x7f0000000080)='syzkaller\x00', 0x7, 0xe2, &(0x7f00000000c0)=""/226, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:15:57 executing program 1: socket(0x10, 0x0, 0x12) 07:15:57 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x19, 0x4, 0x0, 0x4}, 0x40) 07:15:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:15:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x2, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000300)=[@rthdr={{0x18}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0x40}, 0x0) 07:15:57 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x8, 0x0, 0x0) 07:15:57 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x22, 0x0, 0x0) 07:15:57 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x3, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x358, 0x108, 0x2f0, 0xffffffff, 0x218, 0x3d0, 0x3d0, 0x3d0, 0xffffffff, 0x3d0, 0x3d0, 0x5, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0x0, 'veth0_to_hsr\x00', 'geneve0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @local, @gre_key, @icmp_id}}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'caif0\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@loopback, @icmp_id, @icmp_id}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @rand_addr, @remote}}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv6=@dev}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) [ 281.003785][T14988] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 07:15:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x470, 0x168, 0x168, 0xffffffff, 0x0, 0x0, 0x478, 0x478, 0xffffffff, 0x478, 0x478, 0x5, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @private1, [], [], 'lo\x00', 'wlan1\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private1, @ipv4=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@mcast2, @port, @icmp_id}}}, {{@ipv6={@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @remote, [], [], 'team_slave_0\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@mcast1, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d0) 07:15:57 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 281.185425][ T9596] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 281.463975][ T9596] usb 4-1: Using ep0 maxpacket: 8 [ 281.696045][ T9596] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 281.905601][ T9596] usb 4-1: New USB device found, idVendor=05ac, idProduct=0232, bcdDevice= 0.40 [ 281.914726][ T9596] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 281.924914][ T9596] usb 4-1: Product: syz [ 281.929825][ T9596] usb 4-1: Manufacturer: syz [ 281.934428][ T9596] usb 4-1: SerialNumber: syz [ 281.998010][ T9596] usbhid 4-1:1.0: couldn't find an input interrupt endpoint [ 282.201222][ T2943] usb 4-1: USB disconnect, device number 2 [ 282.985232][ T2943] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 283.225175][ T2943] usb 4-1: Using ep0 maxpacket: 8 [ 283.425254][ T2943] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 283.595254][ T2943] usb 4-1: New USB device found, idVendor=05ac, idProduct=0232, bcdDevice= 0.40 [ 283.604356][ T2943] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 283.612523][ T2943] usb 4-1: Product: syz [ 283.616781][ T2943] usb 4-1: Manufacturer: syz [ 283.623075][ T2943] usb 4-1: SerialNumber: syz [ 283.667669][ T2943] usbhid 4-1:1.0: couldn't find an input interrupt endpoint 07:16:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x480}, 0x40) 07:16:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:16:00 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@loopback={0xfec0ffff00000000}, @local, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}) 07:16:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001540)={0x14, r1, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 07:16:00 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 07:16:00 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) write$rfkill(r0, &(0x7f0000000080), 0x8) [ 283.833946][ T2943] usb 4-1: USB disconnect, device number 3 [ 283.934006][T15053] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 07:16:00 executing program 0: mount$fuseblk(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) 07:16:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0xf0ff7f) 07:16:00 executing program 1: r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) shmctl$IPC_RMID(r0, 0x0) 07:16:00 executing program 4: mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, 0x0) 07:16:00 executing program 3: sigaltstack(&(0x7f0000ffe000/0x2000)=nil, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000) 07:16:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:16:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x0, 0x0, {0x2}, [@ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}]}]}, 0x2c}}, 0x0) 07:16:00 executing program 2: openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1\x00', 0x144240, 0x0) 07:16:00 executing program 3: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000002) [ 284.245697][T15079] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 07:16:00 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x309500, 0x0) accept(r0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x1ff}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x800}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0xc8}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x23}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x4020}, 0x20000000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000680)={0x18, r2, 0x1, 0x0, 0x0, {0x3}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) 07:16:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="b4020000f5e00d"], 0x2b4}}, 0x0) 07:16:01 executing program 4: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, [0x0, 0x0, 0x2]}) 07:16:01 executing program 2: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:16:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x240) 07:16:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:16:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x2c}}, 0x0) 07:16:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x894b, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:16:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x0, 0x0, {0x5}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}]}]}, 0x2c}}, 0x0) 07:16:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg$kcm(r0, &(0x7f0000001380)={&(0x7f0000000d00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001200)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000012c0)=""/175, 0xaf}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x20}}, 0x0) [ 284.655967][T15112] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:16:01 executing program 3: socket(0x10, 0x3, 0xfff) [ 284.725389][T15112] bond18 (uninitialized): Released all slaves 07:16:01 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={@map, 0xffffffffffffffff, 0x2}, 0x10) 07:16:01 executing program 1: mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x83070, 0xffffffffffffffff, 0x0) 07:16:01 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$snddsp_status(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x82000000) 07:16:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:16:01 executing program 3: sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000ffc000/0x2000)=nil], &(0x7f0000000040)=[0x5], 0x0, 0x0) 07:16:01 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000340), 0x10) 07:16:01 executing program 1: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x15) 07:16:01 executing program 0: sigaltstack(&(0x7f0000ffe000/0x2000)=nil, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 07:16:01 executing program 2: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0) [ 285.071210][T15146] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 285.111078][T15146] bond18 (uninitialized): Released all slaves 07:16:01 executing program 3: sigaltstack(&(0x7f0000ffe000/0x2000)=nil, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 07:16:01 executing program 4: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 07:16:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f00000006c0)=[{{&(0x7f00000000c0)={0x2, 0x4c23, @empty}, 0x10, 0x0}}, {{&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0x18}}], 0x2, 0x0) 07:16:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380)='batadv\x00') sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 07:16:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000010006707000000004f1a3b65fbd77302", @ANYRES32, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:16:01 executing program 3: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000002d40)='/dev/ocfs2_control\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 07:16:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 07:16:01 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 07:16:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:16:01 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14117e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x400000000000064, 0x15a7e) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 285.471439][T15180] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 285.492070][T15180] bond18 (uninitialized): Released all slaves 07:16:02 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, 0x0) 07:16:02 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000040)='./bus\x00', &(0x7f00000004c0)=""/191, 0xbf) 07:16:02 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000001c0)) 07:16:02 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0xc020660b, 0x0) 07:16:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:16:02 executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x10}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x3d8) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:16:02 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000040)='./bus\x00', &(0x7f00000004c0)=""/191, 0xbf) [ 285.918989][ T36] audit: type=1800 audit(1612682162.424:11): pid=15198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=14212 res=0 errno=0 07:16:02 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 07:16:02 executing program 1: msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/38) 07:16:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@mcast2}) [ 286.031148][ T36] audit: type=1804 audit(1612682162.514:12): pid=15216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir108504292/syzkaller.ZtWND4/186/bus" dev="sda1" ino=14218 res=1 errno=0 07:16:02 executing program 2: sync() getsockname(0xffffffffffffffff, 0x0, 0x0) 07:16:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) [ 286.207510][ T36] audit: type=1804 audit(1612682162.644:13): pid=15216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir108504292/syzkaller.ZtWND4/186/bus" dev="sda1" ino=14218 res=1 errno=0 07:16:02 executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x10}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x3d8) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:16:02 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000040)='./bus\x00', &(0x7f00000004c0)=""/191, 0xbf) 07:16:02 executing program 1: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0xd24ace2190724d41) 07:16:02 executing program 0: socketpair(0xa, 0x3, 0x9, &(0x7f0000000700)) [ 286.357905][ T36] audit: type=1804 audit(1612682162.654:14): pid=15216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir108504292/syzkaller.ZtWND4/186/bus" dev="sda1" ino=14218 res=1 errno=0 07:16:03 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14117e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x400000000000064, 0x15a7e) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 07:16:03 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(r0, 0x0, r0, &(0x7f0000000380)='./file0\x00', 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800000020005d91f, 0x808007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) 07:16:03 executing program 0: syz_open_procfs(0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000003c0)='mptcp_pm\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000f00)={@initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100}, 0xc) 07:16:03 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000040)='./bus\x00', &(0x7f00000004c0)=""/191, 0xbf) [ 286.548015][ T36] audit: type=1804 audit(1612682162.904:15): pid=15251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir108504292/syzkaller.ZtWND4/187/bus" dev="sda1" ino=14224 res=1 errno=0 07:16:03 executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x10}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x3d8) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:16:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000340)={0x0, 0x1f, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="fe2f0000000100001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000008000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="1d0002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}, 0x1, 0xa00000000000000}, 0x0) 07:16:03 executing program 0: syz_open_procfs(0x0, &(0x7f0000000200)='map_files\x00') [ 286.742589][T15272] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 07:16:03 executing program 1: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[], 0x3d8) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) fork() [ 286.822166][ T36] audit: type=1804 audit(1612682163.324:16): pid=15279 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir108504292/syzkaller.ZtWND4/188/bus" dev="sda1" ino=14224 res=1 errno=0 [ 286.864803][T15272] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 286.874406][T15272] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 07:16:03 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_mr_cache\x00') syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 07:16:03 executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x10}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x3d8) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 286.975038][T15272] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 286.999256][ T36] audit: type=1804 audit(1612682163.504:17): pid=15287 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir684231057/syzkaller.HOPyqE/218/bus" dev="sda1" ino=14202 res=1 errno=0 07:16:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001b40)={&(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@tclass={{0x14}}, @hopopts_2292={{0x18}}], 0x30}, 0x8000) [ 287.070248][T15287] ================================================================== [ 287.078710][T15287] BUG: KASAN: use-after-free in find_uprobe+0x12c/0x150 [ 287.085747][T15287] Read of size 8 at addr ffff888024d1b968 by task syz-executor.1/15287 [ 287.094003][T15287] [ 287.096338][T15287] CPU: 1 PID: 15287 Comm: syz-executor.1 Not tainted 5.11.0-rc6-next-20210205-syzkaller #0 [ 287.106332][T15287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.116400][T15287] Call Trace: [ 287.119692][T15287] dump_stack+0x107/0x163 [ 287.124109][T15287] ? find_uprobe+0x12c/0x150 [ 287.128723][T15287] ? find_uprobe+0x12c/0x150 [ 287.133340][T15287] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 287.140420][T15287] ? find_uprobe+0x12c/0x150 [ 287.145042][T15287] ? find_uprobe+0x12c/0x150 [ 287.148252][T15297] fuse: Bad value for 'fd' [ 287.149648][T15287] kasan_report.cold+0x7c/0xd8 [ 287.149713][T15287] ? find_uprobe+0x12c/0x150 [ 287.149748][T15287] find_uprobe+0x12c/0x150 07:16:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x22, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1080a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x400200, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev}, 0x10) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(r0, 0x0, r0, &(0x7f0000000380)='./file0\x00', 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800000020005d91f, 0x808007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) [ 287.167875][T15287] uprobe_apply+0x26/0x130 [ 287.172318][T15287] uprobe_perf_close+0x41e/0x6f0 [ 287.177364][T15287] ? uprobe_apply+0x101/0x130 [ 287.182069][T15287] trace_uprobe_register+0x5ee/0x880 [ 287.187391][T15287] perf_trace_event_init+0x17a/0xa20 [ 287.192710][T15287] perf_uprobe_init+0x16f/0x210 [ 287.197588][T15287] perf_uprobe_event_init+0xff/0x1c0 [ 287.202896][T15287] perf_try_init_event+0x12a/0x560 [ 287.208030][T15287] ? perf_event_alloc.part.0+0xe8c/0x3960 [ 287.213783][T15287] perf_event_alloc.part.0+0xe3b/0x3960 [ 287.219372][T15287] __do_sys_perf_event_open+0x647/0x2e60 [ 287.225047][T15287] ? perf_event_set_output+0x4c0/0x4c0 [ 287.230551][T15287] ? syscall_enter_from_user_mode+0x1d/0x50 [ 287.236502][T15287] do_syscall_64+0x2d/0x70 [ 287.240934][T15287] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 287.246901][T15287] RIP: 0033:0x465b09 [ 287.250810][T15287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 287.270436][T15287] RSP: 002b:00007f6185a77188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 287.278874][T15287] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 [ 287.286857][T15287] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000280 [ 287.294841][T15287] RBP: 00000000004b069f R08: 0000000000000000 R09: 0000000000000000 [ 287.302821][T15287] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000056bf60 [ 287.310807][T15287] R13: 00007ffce5c93baf R14: 00007f6185a77300 R15: 0000000000022000 [ 287.318814][T15287] [ 287.321140][T15287] Allocated by task 15287: [ 287.325557][T15287] kasan_save_stack+0x1b/0x40 [ 287.330335][T15287] ____kasan_kmalloc.constprop.0+0xa0/0xd0 [ 287.336156][T15287] __uprobe_register+0x19c/0x850 [ 287.341112][T15287] probe_event_enable+0x357/0xa00 [ 287.346153][T15287] trace_uprobe_register+0x443/0x880 [ 287.351456][T15287] perf_trace_event_init+0x549/0xa20 [ 287.356792][T15287] perf_uprobe_init+0x16f/0x210 [ 287.361657][T15287] perf_uprobe_event_init+0xff/0x1c0 [ 287.366955][T15287] perf_try_init_event+0x12a/0x560 [ 287.372166][T15287] perf_event_alloc.part.0+0xe3b/0x3960 [ 287.377727][T15287] __do_sys_perf_event_open+0x647/0x2e60 [ 287.383376][T15287] do_syscall_64+0x2d/0x70 [ 287.387807][T15287] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 287.393721][T15287] [ 287.396048][T15287] Freed by task 15287: [ 287.400122][T15287] kasan_save_stack+0x1b/0x40 [ 287.404816][T15287] kasan_set_track+0x1c/0x30 [ 287.409417][T15287] kasan_set_free_info+0x20/0x30 [ 287.414386][T15287] ____kasan_slab_free.part.0+0xe1/0x110 [ 287.420040][T15287] slab_free_freelist_hook+0x82/0x1d0 [ 287.425437][T15287] kfree+0xe5/0x7b0 [ 287.429259][T15287] put_uprobe+0x13b/0x190 [ 287.433624][T15287] uprobe_apply+0xfc/0x130 [ 287.438059][T15287] trace_uprobe_register+0x5c9/0x880 [ 287.443362][T15287] perf_trace_event_init+0x17a/0xa20 [ 287.448765][T15287] perf_uprobe_init+0x16f/0x210 [ 287.453632][T15287] perf_uprobe_event_init+0xff/0x1c0 [ 287.458930][T15287] perf_try_init_event+0x12a/0x560 [ 287.464055][T15287] perf_event_alloc.part.0+0xe3b/0x3960 [ 287.469617][T15287] __do_sys_perf_event_open+0x647/0x2e60 [ 287.475298][T15287] do_syscall_64+0x2d/0x70 [ 287.479749][T15287] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 287.485664][T15287] [ 287.487995][T15287] Last potentially related work creation: [ 287.493805][T15287] kasan_save_stack+0x1b/0x40 [ 287.498496][T15287] kasan_record_aux_stack+0xe5/0x110 [ 287.503800][T15287] insert_work+0x48/0x370 [ 287.508223][T15287] __queue_work+0x5c1/0xf00 [ 287.512748][T15287] call_timer_fn+0x1a5/0x6b0 [ 287.517402][T15287] __run_timers.part.0+0x4a6/0xa50 [ 287.522535][T15287] run_timer_softirq+0xb3/0x1d0 [ 287.527407][T15287] __do_softirq+0x29b/0x9f6 [ 287.531931][T15287] [ 287.534260][T15287] The buggy address belongs to the object at ffff888024d1b800 [ 287.534260][T15287] which belongs to the cache kmalloc-512 of size 512 [ 287.548323][T15287] The buggy address is located 360 bytes inside of [ 287.548323][T15287] 512-byte region [ffff888024d1b800, ffff888024d1ba00) [ 287.561607][T15287] The buggy address belongs to the page: [ 287.567238][T15287] page:000000006ad24b35 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x24d1a [ 287.577403][T15287] head:000000006ad24b35 order:1 compound_mapcount:0 [ 287.584002][T15287] flags: 0xfff00000010200(slab|head) [ 287.589308][T15287] raw: 00fff00000010200 dead000000000100 dead000000000122 ffff888010841c80 [ 287.597907][T15287] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000 [ 287.606494][T15287] page dumped because: kasan: bad access detected [ 287.612907][T15287] [ 287.615235][T15287] Memory state around the buggy address: [ 287.621227][T15287] ffff888024d1b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 287.629319][T15287] ffff888024d1b880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 287.637397][T15287] >ffff888024d1b900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 287.645470][T15287] ^ [ 287.652933][T15287] ffff888024d1b980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 287.661005][T15287] ffff888024d1ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 287.669070][T15287] ================================================================== [ 287.677133][T15287] Disabling lock debugging due to kernel taint [ 287.687059][T15287] Kernel panic - not syncing: panic_on_warn set ... [ 287.693663][T15287] CPU: 1 PID: 15287 Comm: syz-executor.1 Tainted: G B 5.11.0-rc6-next-20210205-syzkaller #0 [ 287.705037][T15287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.715181][T15287] Call Trace: [ 287.718461][T15287] dump_stack+0x107/0x163 [ 287.722806][T15287] ? find_uprobe+0x90/0x150 [ 287.727320][T15287] panic+0x306/0x73d [ 287.731265][T15287] ? __warn_printk+0xf3/0xf3 [ 287.735864][T15287] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 287.742033][T15287] ? trace_hardirqs_on+0x38/0x1c0 [ 287.747125][T15287] ? trace_hardirqs_on+0x51/0x1c0 [ 287.752167][T15287] ? find_uprobe+0x12c/0x150 [ 287.756770][T15287] ? find_uprobe+0x12c/0x150 [ 287.761375][T15287] end_report.cold+0x5a/0x5a [ 287.765985][T15287] kasan_report.cold+0x6a/0xd8 [ 287.770762][T15287] ? find_uprobe+0x12c/0x150 [ 287.775365][T15287] find_uprobe+0x12c/0x150 [ 287.779799][T15287] uprobe_apply+0x26/0x130 [ 287.784229][T15287] uprobe_perf_close+0x41e/0x6f0 [ 287.789184][T15287] ? uprobe_apply+0x101/0x130 [ 287.793877][T15287] trace_uprobe_register+0x5ee/0x880 [ 287.799202][T15287] perf_trace_event_init+0x17a/0xa20 [ 287.804516][T15287] perf_uprobe_init+0x16f/0x210 [ 287.809377][T15287] perf_uprobe_event_init+0xff/0x1c0 [ 287.814675][T15287] perf_try_init_event+0x12a/0x560 [ 287.819795][T15287] ? perf_event_alloc.part.0+0xe8c/0x3960 [ 287.825612][T15287] perf_event_alloc.part.0+0xe3b/0x3960 [ 287.831177][T15287] __do_sys_perf_event_open+0x647/0x2e60 [ 287.836828][T15287] ? perf_event_set_output+0x4c0/0x4c0 [ 287.842305][T15287] ? syscall_enter_from_user_mode+0x1d/0x50 [ 287.848206][T15287] do_syscall_64+0x2d/0x70 [ 287.852637][T15287] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 287.858547][T15287] RIP: 0033:0x465b09 [ 287.862444][T15287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 287.882054][T15287] RSP: 002b:00007f6185a77188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 287.890457][T15287] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 [ 287.898511][T15287] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000280 [ 287.906496][T15287] RBP: 00000000004b069f R08: 0000000000000000 R09: 0000000000000000 [ 287.914539][T15287] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000056bf60 [ 287.922498][T15287] R13: 00007ffce5c93baf R14: 00007f6185a77300 R15: 0000000000022000 [ 287.930998][T15287] Kernel Offset: disabled [ 287.935313][T15287] Rebooting in 86400 seconds..