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"}, 0x1000) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r1) write$tun(r1, &(0x7f0000000000)={@void, @void, @arp=@generic={0x339, 0x886c, 0x6, 0x7, 0xa, @random="0f92515d4f1b", "d79bdf7778ea28", @remote, "2d62eb2a811c09f6478ea9d47245"}}, 0x29) 19:12:38 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x1, 0x0, 0x0, "", [{{0x8}, {0x8, 0x3, 0x1}}]}, 0x20}}, 0x0) [ 500.180092][T12402] netlink: 400 bytes leftover after parsing attributes in process `syz-executor.5'. 19:12:39 executing program 5: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) [ 500.371030][ T24] audit: type=1804 audit(1639422759.060:20): pid=12406 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir382411912/syzkaller.tUAfKO/226/cgroup.controllers" dev="sda1" ino=15035 res=1 errno=0 19:12:39 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x3c, r0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x60000000}]}]}, 0x3c}}, 0x0) 19:12:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000780)=@ipv6_newroute={0x190, 0x18, 0x200, 0x70bd28, 0x25dfdbfb, {0xa, 0x0, 0x0, 0x4, 0xff, 0x0, 0xfe, 0x3, 0x1000}, [@RTA_PRIORITY={0x8, 0x6, 0x5}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_METRICS={0xeb, 0x8, 0x0, 0x1, "31548d933f9d7fb6945c8f15368d8b5d9092cab0026c35f8428b5833690628cdbb0980a19a4b19155f424c5d0fea369ebd8d053ccc55eec8fe17ff61a17d8e8ac6876158e2bfe2f9091560a5223be3fa5aecddce915d203bf6c1b816dd8030df2c611e0a3ecc624d8057a43eebf45989c2bcf1f05c41510d3f3979aa629db67e3ffbca782b4c0f14cfdd96a8af3856510169242b31579b49584ebbde3e65bfbc6bcac4c6d449003588b128f933a34d60ddfe3554de09cafe8bf3a15b0117432340635167d5c496a746cc3c94e7ea599e80523ecbfe48206175ed7012cecc0becf5bbf5214cb8bf"}, @RTA_METRICS={0x2f, 0x8, 0x0, 0x1, "933879d77e29f21fe9f30c4ffd690f90f3ac9808192d1cc1f54519a3095091bcb6571003c32ae52ac58ab7"}, @RTA_PRIORITY={0x8, 0x6, 0x10000000}, @RTA_PREF={0x5, 0x14, 0xff}, @RTA_MULTIPATH={0xc, 0x9, {0x3ff, 0x8, 0x40, r7}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_MULTIPATH={0xc, 0x9, {0x6dd, 0x24, 0x3, r2}}, @RTA_METRICS={0x18, 0x8, 0x0, 0x1, "38ec1684a6cda24ffec69e905772e070927f8f6e"}]}, 0x190}, 0x1, 0x0, 0x0, 0xc041}, 0x8804) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:12:39 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f00000000c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) 19:12:39 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x1, 0x0, 0x0, "", [{{0x8}, {0x8, 0x3, 0x1}}]}, 0x20}}, 0x0) 19:12:39 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 501.109067][T12422] IPVS: sync thread started: state = BACKUP, mcast_ifn = vcan0, syncid = 1610612736, id = 0 19:12:39 executing program 4: r0 = socket(0xa, 0x5, 0x0) getsockname(r0, 0x0, &(0x7f00000011c0)) 19:12:40 executing program 0: select(0x40, &(0x7f00000003c0), 0x0, 0x0, 0x0) [ 501.380125][T12426] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 501.480504][T12428] tipc: Enabling of bearer rejected, failed to enable media [ 501.602375][T12465] 8021q: adding VLAN 0 to HW filter on device bond2 19:12:40 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 501.766596][T12465] bond0: (slave bond2): Enslaving as an active interface with an up link [ 501.794642][T12466] device bridge2 entered promiscuous mode [ 501.801954][T12466] device bridge2 left promiscuous mode [ 501.818803][T12466] bond2: (slave vlan3): making interface the new active one [ 501.827222][T12466] device bridge2 entered promiscuous mode [ 501.837636][T12466] bond2: (slave vlan3): Enslaving as an active interface with an up link 19:12:40 executing program 2: sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x1, 0x0, 0x0, "", [{{0x8}, {0x8, 0x3, 0x1}}]}, 0x20}}, 0x0) 19:12:41 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x331240, 0x0) 19:12:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x2002) sendmsg$unix(r1, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001200)="f1", 0x1}], 0x1}, 0x0) 19:12:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000780)=@ipv6_newroute={0x190, 0x18, 0x200, 0x70bd28, 0x25dfdbfb, {0xa, 0x0, 0x0, 0x4, 0xff, 0x0, 0xfe, 0x3, 0x1000}, [@RTA_PRIORITY={0x8, 0x6, 0x5}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_METRICS={0xeb, 0x8, 0x0, 0x1, "31548d933f9d7fb6945c8f15368d8b5d9092cab0026c35f8428b5833690628cdbb0980a19a4b19155f424c5d0fea369ebd8d053ccc55eec8fe17ff61a17d8e8ac6876158e2bfe2f9091560a5223be3fa5aecddce915d203bf6c1b816dd8030df2c611e0a3ecc624d8057a43eebf45989c2bcf1f05c41510d3f3979aa629db67e3ffbca782b4c0f14cfdd96a8af3856510169242b31579b49584ebbde3e65bfbc6bcac4c6d449003588b128f933a34d60ddfe3554de09cafe8bf3a15b0117432340635167d5c496a746cc3c94e7ea599e80523ecbfe48206175ed7012cecc0becf5bbf5214cb8bf"}, @RTA_METRICS={0x2f, 0x8, 0x0, 0x1, "933879d77e29f21fe9f30c4ffd690f90f3ac9808192d1cc1f54519a3095091bcb6571003c32ae52ac58ab7"}, @RTA_PRIORITY={0x8, 0x6, 0x10000000}, @RTA_PREF={0x5, 0x14, 0xff}, @RTA_MULTIPATH={0xc, 0x9, {0x3ff, 0x8, 0x40, r7}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_MULTIPATH={0xc, 0x9, {0x6dd, 0x24, 0x3, r2}}, @RTA_METRICS={0x18, 0x8, 0x0, 0x1, "38ec1684a6cda24ffec69e905772e070927f8f6e"}]}, 0x190}, 0x1, 0x0, 0x0, 0xc041}, 0x8804) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 502.424695][T12494] tipc: Enabling of bearer rejected, failed to enable media 19:12:41 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) 19:12:41 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:12:41 executing program 2: sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x1, 0x0, 0x0, "", [{{0x8}, {0x8, 0x3, 0x1}}]}, 0x20}}, 0x0) [ 503.045577][T12504] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:12:41 executing program 0: msgsnd(0xffffffffffffffff, &(0x7f00000040c0), 0x8, 0x0) 19:12:42 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000640)=ANY=[], 0x6c, 0x0) 19:12:42 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000780), 0x0) [ 503.494192][T12516] 8021q: adding VLAN 0 to HW filter on device bond3 [ 503.620142][T12516] bond0: (slave bond3): Enslaving as an active interface with an up link [ 503.650301][T12541] device bridge3 entered promiscuous mode [ 503.658016][T12541] device bridge3 left promiscuous mode [ 503.675517][T12541] bond3: (slave vlan4): making interface the new active one [ 503.684182][T12541] device bridge3 entered promiscuous mode [ 503.698200][T12541] bond3: (slave vlan4): Enslaving as an active interface with an up link 19:12:42 executing program 2: sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x1, 0x0, 0x0, "", [{{0x8}, {0x8, 0x3, 0x1}}]}, 0x20}}, 0x0) [ 503.718053][T12543] tipc: Enabling of bearer rejected, failed to enable media 19:12:42 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 504.164158][ T24] audit: type=1800 audit(1639422762.860:21): pid=12555 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15036 res=0 errno=0 19:12:43 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 19:12:43 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) linkat(r0, &(0x7f0000004140)='./file0\x00', r0, &(0x7f0000004180)='./file0\x00', 0x0) 19:12:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:12:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000780)=@ipv6_newroute={0x190, 0x18, 0x200, 0x70bd28, 0x25dfdbfb, {0xa, 0x0, 0x0, 0x4, 0xff, 0x0, 0xfe, 0x3, 0x1000}, [@RTA_PRIORITY={0x8, 0x6, 0x5}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_METRICS={0xeb, 0x8, 0x0, 0x1, "31548d933f9d7fb6945c8f15368d8b5d9092cab0026c35f8428b5833690628cdbb0980a19a4b19155f424c5d0fea369ebd8d053ccc55eec8fe17ff61a17d8e8ac6876158e2bfe2f9091560a5223be3fa5aecddce915d203bf6c1b816dd8030df2c611e0a3ecc624d8057a43eebf45989c2bcf1f05c41510d3f3979aa629db67e3ffbca782b4c0f14cfdd96a8af3856510169242b31579b49584ebbde3e65bfbc6bcac4c6d449003588b128f933a34d60ddfe3554de09cafe8bf3a15b0117432340635167d5c496a746cc3c94e7ea599e80523ecbfe48206175ed7012cecc0becf5bbf5214cb8bf"}, @RTA_METRICS={0x2f, 0x8, 0x0, 0x1, "933879d77e29f21fe9f30c4ffd690f90f3ac9808192d1cc1f54519a3095091bcb6571003c32ae52ac58ab7"}, @RTA_PRIORITY={0x8, 0x6, 0x10000000}, @RTA_PREF={0x5, 0x14, 0xff}, @RTA_MULTIPATH={0xc, 0x9, {0x3ff, 0x8, 0x40, r7}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_MULTIPATH={0xc, 0x9, {0x6dd, 0x24, 0x3, r2}}, @RTA_METRICS={0x18, 0x8, 0x0, 0x1, "38ec1684a6cda24ffec69e905772e070927f8f6e"}]}, 0x190}, 0x1, 0x0, 0x0, 0xc041}, 0x8804) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:12:43 executing program 2: socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x1, 0x0, 0x0, "", [{{0x8}, {0x8, 0x3, 0x1}}]}, 0x20}}, 0x0) 19:12:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000680)={&(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, &(0x7f00000018c0)=[{&(0x7f00000002c0)="ec", 0x1}], 0x1, &(0x7f00000004c0)=[@dstopts={{0x18}}, @rthdr_2292={{0x18}}], 0x30}, 0x4044894) 19:12:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) io_setup(0xff, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x1, 0x1, &(0x7f00000003c0)=[{}], 0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 19:12:43 executing program 4: sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e2, &(0x7f0000000000)) 19:12:43 executing program 2: socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x1, 0x0, 0x0, "", [{{0x8}, {0x8, 0x3, 0x1}}]}, 0x20}}, 0x0) [ 505.328721][T12564] tipc: Enabling of bearer rejected, failed to enable media [ 505.343894][T12572] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:12:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000680)={&(0x7f0000000140)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0}, 0x404c0d5) [ 505.529202][T12575] 8021q: adding VLAN 0 to HW filter on device bond4 [ 505.547023][T12575] bond0: (slave bond4): Enslaving as an active interface with an up link [ 505.588155][T12578] device bridge4 entered promiscuous mode [ 505.595639][T12578] device bridge4 left promiscuous mode [ 505.612692][T12578] bond4: (slave vlan5): making interface the new active one [ 505.621128][T12578] device bridge4 entered promiscuous mode [ 505.631653][T12578] bond4: (slave vlan5): Enslaving as an active interface with an up link 19:12:44 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:12:44 executing program 2: socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x1, 0x0, 0x0, "", [{{0x8}, {0x8, 0x3, 0x1}}]}, 0x20}}, 0x0) 19:12:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:12:44 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, 0x0) bind$bt_hci(r0, &(0x7f0000000000), 0x6) 19:12:44 executing program 4: sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/241) 19:12:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_TX_RATES={0x4e8, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0xc0, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x5, 0x2, [{}]}, @NL80211_TXRATE_HT={0x45, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x5, 0x2, [{}]}, @NL80211_TXRATE_HT={0x3d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_6GHZ={0xb4, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x9, 0x2, [{}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @NL80211_BAND_60GHZ={0x60, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x3d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x0]}]}, @NL80211_BAND_2GHZ={0x9c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xd, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x35, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_5GHZ={0x18, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_6GHZ={0x110, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x15, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x3d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x15, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x31, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x4d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_60GHZ={0x24, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @NL80211_BAND_60GHZ={0x1c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x5, 0x1, [0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_5GHZ={0x90, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xd, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x31, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0xd, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @NL80211_BAND_5GHZ={0x7c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x19, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x0]}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}]}, @NL80211_ATTR_TX_RATES={0x328, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x10, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, @NL80211_BAND_5GHZ={0x8c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x4d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0xd, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @NL80211_BAND_2GHZ={0x5c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_2GHZ={0x104, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x49, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0xd, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x11, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x35, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x29, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_5GHZ={0x88, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x9, 0x2, [{}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x11, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x3d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_6GHZ={0xa0, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x39, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}]}, @NL80211_ATTR_TX_RATES={0x54, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x38, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x9, 0x2, [{}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x9, 0x2, [{}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0xd, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_5GHZ={0x18, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}]}]}, @NL80211_ATTR_TX_RATES={0x404, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x78, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xd, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_LEGACY={0xd, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x1d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_60GHZ={0x4c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x29, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_2GHZ={0xa0, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x1d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0xe0, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0xd, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x45, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x15, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_2GHZ={0x6c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x41, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x0]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0x34, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x25, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0x64, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x35, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_60GHZ={0x18, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_2GHZ={0xa0, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x11, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x51, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}]}]}, @NL80211_ATTR_TX_RATES={0x23c, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x98, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x15, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @NL80211_BAND_6GHZ={0xdc, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x41, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_60GHZ={0x58, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0xd, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x29, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0x38, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0x18, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_60GHZ={0x1c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}]}]}, 0xec4}}, 0x0) 19:12:45 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:12:45 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, 0x0, 0x0) [ 506.759279][T12632] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 507.018353][T12657] 8021q: adding VLAN 0 to HW filter on device bond5 [ 507.033517][T12657] bond0: (slave bond5): Enslaving as an active interface with an up link [ 507.080144][T12672] device bridge5 entered promiscuous mode [ 507.087556][T12672] device bridge5 left promiscuous mode [ 507.104809][T12672] bond5: (slave vlan6): making interface the new active one [ 507.113494][T12672] device bridge5 entered promiscuous mode [ 507.124040][T12672] bond5: (slave vlan6): Enslaving as an active interface with an up link 19:12:45 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 19:12:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000680)={&(0x7f0000000240)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x0, 0x0, 0xff79}, 0x0) 19:12:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000980), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000940), r0) 19:12:46 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, 0x0, 0x0) 19:12:46 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:12:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:12:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 19:12:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x4ea2, 0x0, @mcast2, 0x85e}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@pktinfo={{0x24, 0x29, 0x32, {@private1, r2}}}], 0x28}, 0x0) 19:12:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x4ea2, 0x0, @mcast2, 0x85e}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@pktinfo={{0x24, 0x29, 0x32, {@private1}}}], 0x28}, 0x0) 19:12:47 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, 0x0, 0x0) 19:12:47 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 508.445092][T12696] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 508.669487][T12735] bond6: (slave vlan7): making interface the new active one [ 508.684463][T12735] bond6: (slave vlan7): Enslaving as an active interface with an up link 19:12:47 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 19:12:47 executing program 3: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, 0x0) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 19:12:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000680)={&(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, &(0x7f00000018c0)=[{&(0x7f00000002c0)="ec", 0x1}], 0x1}, 0x0) 19:12:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:12:47 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 19:12:48 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:12:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 19:12:48 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000180)) 19:12:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x7) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 509.957615][T12757] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 510.157061][T12797] bond7: (slave vlan8): making interface the new active one [ 510.171847][T12797] bond7: (slave vlan8): Enslaving as an active interface with an up link 19:12:48 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 19:12:49 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:12:49 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000680)={&(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}, 0x4004884) 19:12:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:12:49 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) bind$bt_hci(r0, &(0x7f0000000040), 0x62) 19:12:49 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 19:12:49 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000200)) 19:12:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:12:50 executing program 0: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r0 = shmget$private(0x0, 0xd000, 0x0, &(0x7f0000ff3000/0xd000)=nil) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x7000) [ 511.532772][T12816] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 511.743588][T12857] bond8: (slave vlan9): making interface the new active one [ 511.758907][T12857] bond8: (slave vlan9): Enslaving as an active interface with an up link 19:12:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) io_setup(0xff, &(0x7f00000000c0)=0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) io_getevents(r1, 0x1, 0x2, &(0x7f00000003c0)=[{}, {}], &(0x7f0000000480)={0x0, r2+60000000}) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 19:12:50 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) [ 512.160856][T12862] tipc: Enabling of bearer rejected, failed to enable media 19:12:51 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x4042, 0x0) 19:12:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:12:51 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000020c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 19:12:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:12:51 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) 19:12:51 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003580)={0x0, 0x0, &(0x7f0000003240), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000004300000100bad2d1c437", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000100000000000000001000000010000"], 0x50, 0x801}, 0x4000004) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="3805987e", @ANYRES16=0x0, @ANYBLOB="000325bd7000ffdbdf25410000000c009900b000000013000000080026002517000008002201920200000800260071090000"], 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x840) rename(&(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000580)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@private0, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x8000000000001f4) 19:12:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @loopback}}}}) [ 513.019108][ T24] audit: type=1800 audit(1639422771.710:22): pid=12876 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=13939 res=0 errno=0 [ 513.094823][T12876] fuse: Bad value for 'fd' 19:12:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 513.341915][T12880] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:12:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x8, &(0x7f00000002c0)=@framed={{}, [@initr0, @exit, @call, @jmp]}, &(0x7f0000000340)='GPL\x00', 0x5, 0xa5, &(0x7f0000000380)=""/165, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 513.689302][T12897] bond9: (slave vlan10): making interface the new active one [ 513.705962][T12897] bond9: (slave vlan10): Enslaving as an active interface with an up link 19:12:52 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) 19:12:52 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = getpgrp(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000180)) 19:12:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:12:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:12:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x8d84, [{0x0, 0x1}, {0x5, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x6f]}}, &(0x7f0000000280)=""/229, 0x43, 0xe5, 0x1}, 0x20) 19:12:53 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x0, 0x0, 0x0, "", [{{0x8}, {0x8, 0x3, 0x1}}]}, 0x20}}, 0x0) [ 514.991514][ T1199] ieee802154 phy0 wpan0: encryption failed: -22 [ 514.999151][ T1199] ieee802154 phy1 wpan1: encryption failed: -22 19:12:53 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x1, 0x0, 0x4, "c653b62dd84faa2612438f6ad906fca1ca0103172a5dd681fcd6b02acbc6fb83f35ebb21aac3298205be6d1e93cc5ff9df5e01684520cf1b2fb92ec1b27aad", 0x2}, 0x60) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x1f, 0xfc, 0x0, 0x83, 0x0, 0x7ff, 0x20002, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x0, @perf_config_ext={0x4, 0x7fff}, 0x0, 0xda, 0xffffffff, 0x1, 0x2, 0x0, 0xc5, 0x0, 0xf5d8, 0x0, 0x8000}, 0x0, 0x0, r1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x66) ioctl$FIONCLEX(r2, 0x5450) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, r3, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0}) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0}) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, 0x0) [ 515.137975][T12939] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:12:54 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:12:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x7, [@struct={0x0, 0x3, 0x0, 0x4, 0x0, 0x8d84, [{0x0, 0x1}, {0x5, 0x3}, {0xc}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x6f]}}, &(0x7f0000000280)=""/229, 0x4f, 0xe5, 0x1}, 0x20) 19:12:54 executing program 0: r0 = syz_usb_connect(0x1, 0x349, &(0x7f0000000000)={{0x12, 0x1, 0x310, 0x6a, 0xf6, 0x6e, 0x8, 0x572, 0x86d6, 0x4dcc, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x337, 0x1, 0x0, 0x72, 0xf0, 0x4c, [{{0x9, 0x4, 0x16, 0x1, 0xd, 0xe5, 0x57, 0xb5, 0x0, [@uac_as={[@format_type_ii_discrete={0x9}, @format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x2, 0x4, 0x4, 0x3f, "c1", "ef"}, @format_type_ii_discrete={0xb, 0x24, 0x2, 0x2, 0x1, 0xfffa, 0x7, "42e9"}, @format_type_i_continuous={0xc, 0x24, 0x2, 0x1, 0x80, 0x3, 0x9, 0x2, "99", "1ee876"}, @format_type_ii_discrete={0x10, 0x24, 0x2, 0x2, 0x1200, 0x1, 0x7, "4d4d2b902eed7b"}, @format_type_i_continuous={0x9, 0x24, 0x2, 0x1, 0xff, 0x1, 0x7, 0x3, "", '/'}]}], [{{0x9, 0x5, 0xd, 0x2, 0x400, 0x7, 0x6, 0x7f, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0xd2, 0x4}, @generic={0xc9, 0x0, "6b90fac2f5c6fc729ee2bc2eda1da808b10d03b748ab7baf53631a6ac9bacdc64018c5e92a8a674e72e1635b7fc7af9a33b2b60a5f7df95718ea56474f0ba42170d6f181c8ff47ae9eb2de14782dc1f458544de7828da64b67f623473514a7a87454050fbd68a56ba58eeb55f36661496b00d717430f7fbae9ef5b94e1da5709c07e713a8dfedcf4c41842ab4f674b8d7cf345f657d207a587ff5f1332fb291a3119041636363e1546130eff00ab02b4ac249744c124c81428410fb077dc57d9a33992a54f23e2"}]}}, {{0x9, 0x5, 0xa, 0x1, 0x400, 0xe1, 0x8, 0xd7, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x8, 0x4}, @generic={0x41, 0x77, "ccab81cb455918ccc797f2e029c087caf1759b1723d3d838bacd3154055929c1f0e9bb7dc66cf148ffe0f8ee543bcd8b8ecef1187aa7fdb37f8e761938481c"}]}}, {{0x9, 0x5, 0xa, 0x0, 0x400, 0x4, 0xff, 0x4e, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x4b, 0x6}]}}, {{0x9, 0x5, 0x2, 0x0, 0x20, 0x4d, 0x7f, 0x20, [@generic={0x1d, 0x23, "4b7262911098f2606d01c4bb5389e67e4b31ad75c13576c3537f27"}]}}, {{0x9, 0x5, 0x5, 0x10, 0x430, 0x9, 0xb8, 0x80}}, {{0x9, 0x5, 0xa, 0x4, 0x20, 0x1, 0xff, 0xdd, [@generic={0xb6, 0xb, "72d31f957a52de38ed2e4f4e4a5197bf6cc4bcac47b53fa28820ada748c41833971dd75c385e92266462a01d840aa2c0a8468ae9b81a044b8dc5d14873a1c1e3432f5fa079be1babb8693c85ca76cccb2a4371d29528862df880c27c033a1afab1e7e024073ea774dcbfba2b832348312c67f4d50db15ce148eef478beb522c5394c207ea6cea755a9b8bc707cf64e674bae00079d5eb321f6a7a2036ed0c78720e7187c3562be26f2724a6a2e8036f5e188c272"}, @uac_iso={0x7, 0x25, 0x1, 0x82, 0xaf, 0x6}]}}, {{0x9, 0x5, 0x2, 0x3, 0x400, 0xff, 0xf7, 0x9, [@generic={0x6d, 0x11, "e1f1e673e40482b7de41e65d8a431b65f138c6f1eb53cc1f595e6cb8d9b8ed6dcbaa0fa0a41b6ff1e8fc7ffe9a4b7fe19699258d062feee8a4922f852add175dcdc00c40e979a90acd9b226ef80b20fd3c26b80661a8664a2083d1f70f9016a28c6e887a360f896100890d"}]}}, {{0x9, 0x5, 0xe, 0x7d54d1a2c81e39bc, 0x10, 0x1f, 0xfd, 0x6}}, {{0x9, 0x5, 0x1, 0x10, 0x40, 0x7f, 0x9, 0x97}}, {{0x9, 0x5, 0x4, 0x2, 0x8, 0x80, 0x7, 0x3}}, {{0x9, 0x5, 0xa, 0x4, 0x3ff, 0x5, 0x5, 0xde}}, {{0x9, 0x5, 0x8d, 0x0, 0x40, 0x4, 0x5, 0x7f}}, {{0x9, 0x5, 0xd, 0xc, 0x8, 0x4, 0x8, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x40, 0x7}]}}]}}]}}]}}, &(0x7f00000007c0)={0xa, &(0x7f0000000600)={0xa, 0x6, 0x110, 0xff, 0x3f, 0x2, 0x8, 0x7}, 0x47, &(0x7f0000000d00)={0x5, 0xf, 0x47, 0x3, [@ss_container_id={0x14, 0x10, 0x4, 0x5, "6c6634529943d84e0008864396d64822"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x3, 0x7, 0xde9}, @ssp_cap={0x24, 0x10, 0xa, 0x2, 0x6, 0x4, 0xf000, 0xffff, [0x3f00, 0xff30, 0x1e, 0xff, 0xff00, 0x0]}]}, 0x4, [{0x72, &(0x7f0000000680)=@string={0x72, 0x3, "0c3e86fec0044cda5ffdd00f4065e7d8482fcfc8631d0b997cddbf8016fa27c165e2b7be0ab07b624671cfe33111f184252185a38ff779ed4395c9a84b329a7478c017b1fdea236d47b9f6713cad9486125032918630a73aff0a58923af209c97a4ef99a17fc1ffe9d2cc28cd7158a46"}}, {0x4, &(0x7f0000000700)=@lang_id={0x4, 0x3, 0x500a}}, {0xe9, &(0x7f0000000d80)=@string={0xe9, 0x3, "1acd3cc7935a47ee45346c7bf1175c08ccad1a392caa7fcc0420594eb29becd0b43207fb51014f43d261db3dfa6a17d7cff5faafb113917a41056c41479cf9ff296e151655f47f9269c0ac54fe80dbe9dac296711749e5e20d0b26bf8f8a5efabce04b55a71abd2a141c50d40a4a4d33421ec72537e337813410862e19b092af18f72dec146617f5e2d2381e227d2a2240ec5b02b90128c335ade6d3eb268cc91e3ed8a7b62d3bb508a93e8105f44d914947cd13a1a1c02d4e95b1e4b3923958d6e3406697fbbf34bee3cefb78d1010beafb51398e79bceb3edeaeed0a9308143e2c9b3d082e3b"}}, {0x4, &(0x7f0000000780)=@lang_id={0x4, 0x3, 0x2009}}]}) syz_usb_control_io$uac1(r0, &(0x7f0000000980)={0x14, &(0x7f0000000840)={0x40, 0x31, 0x9d, {0x9d, 0xb, "e65a4a5c92217de2dc6783526496f628909b01d6b3fe50c144771cedb6f90b97a4a01b24f1ebcba62af6db132403e27c3242ca23be45ed29f707d590a7a7a2d28d2e718e65ebe31368f79776523f2f0b80bef2bf10db680b45a637b5d200209711a41cde5d63da9cdb3140049ba418884588a909a6b57b0476f668187e7ec405cd4e09e21b7b9789c19eab9108132df263cae5f5b2ca82970bd77e"}}, &(0x7f0000000900)={0x0, 0x3, 0x5e, @string={0x5e, 0x3, "108afa1e6d3c3c41cdc8cfb96bbb2823a0cd2642257183b4657182c83de47cd300a73cf26603c3538d5b8dc09b35b0840c7e62c0680a861548644eec51735cef4578207b328686963e8bf3a2b4c8b993a36de6503c025d1575c8202f"}}}, &(0x7f0000000c80)={0x44, &(0x7f00000009c0)={0x20, 0x31, 0xf9, "70558f5fccb35ef9cbb200725e3840e411e003322d14c6631522739e832559e82337e153639109ea9055fe6a1c4917113de746746e04620f8fba0c6691b1545d49a11869f6a8aa59d0c448d7de05aefd66669948f04f25a449d50c9320ef357edcd55c488ec2c942c829e1702069646cda21318affbfd492e40d682c1035a2aa3c5c78b67c246d7a424f4623e8e809b8cc8022ac327aac2518be1a91a46b6c5ac56e044caa35f8dd20cb0b3a797ac23f8dcd1b93cbb9f832e0330d1b6da0527cc98e8d61bac23c5417a164b3cce57b11980b0822e2a680673d8f54448d2b0bb9d85bc7d99408269790abbaf0ab479d473b761610fb82b004df"}, &(0x7f0000000ac0)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000000b00)={0x0, 0x8, 0x1, 0x1d}, &(0x7f0000000b40)={0x20, 0x81, 0x2, "b73b"}, &(0x7f0000000b80)={0x20, 0x82, 0x2, "aef5"}, &(0x7f0000000bc0)={0x20, 0x83, 0x3, "f875ea"}, &(0x7f0000000c00)={0x20, 0x84, 0x3, "fd593d"}, &(0x7f0000000c40)={0x20, 0x85, 0x3, "54f46e"}}) [ 515.540346][T12974] bond10: (slave vlan11): making interface the new active one [ 515.556902][T12974] bond10: (slave vlan11): Enslaving as an active interface with an up link 19:12:54 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x0, 0x0, 0x0, "", [{{0x8}, {0x8, 0x3, 0x1}}]}, 0x20}}, 0x0) [ 515.702935][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 19:12:54 executing program 4: syz_mount_image$ext4(&(0x7f00000028c0)='ext4\x00', &(0x7f0000002900)='./file0\x00', 0x0, 0x1, &(0x7f0000003b80)=[{0x0, 0x0, 0x200}], 0x0, &(0x7f0000003c00)) 19:12:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:12:55 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:12:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000140)={'veth0_macvtap\x00', @ifru_data=&(0x7f0000000100)="080000003406cf0d22b55668b9dcdc5f8e637dba0982c2a3d1bd8d02ba2254f5"}) 19:12:55 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x0, 0x0, 0x0, "", [{{0x8}, {0x8, 0x3, 0x1}}]}, 0x20}}, 0x0) [ 516.620607][T12996] loop4: detected capacity change from 0 to 2 [ 516.657162][T12996] EXT4-fs (loop4): unable to read superblock [ 516.833350][ T8463] usb 1-1: new low-speed USB device number 3 using dummy_hcd 19:12:55 executing program 4: pselect6(0x40, &(0x7f0000000340), &(0x7f0000000380)={0x1}, &(0x7f00000003c0), 0x0, 0x0) [ 517.080608][T13006] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:12:56 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 517.330159][T13038] bond11: (slave vlan12): making interface the new active one [ 517.345308][T13038] bond11: (slave vlan12): Enslaving as an active interface with an up link 19:12:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x89f5, &(0x7f0000000000)={'sit0\x00', @ifru_mtu}) [ 517.515155][ T8463] usb 1-1: config 0 has an invalid interface number: 22 but max is 0 [ 517.526174][ T8463] usb 1-1: config 0 has no interface number 0 [ 517.532445][ T8463] usb 1-1: config 0 interface 22 altsetting 1 endpoint 0xD is Bulk; changing to Interrupt [ 517.543369][ T8463] usb 1-1: config 0 interface 22 altsetting 1 endpoint 0xA has an invalid bInterval 225, changing to 4 [ 517.554751][ T8463] usb 1-1: config 0 interface 22 altsetting 1 endpoint 0xA has invalid maxpacket 1024, setting to 0 [ 517.565859][ T8463] usb 1-1: config 0 interface 22 altsetting 1 has a duplicate endpoint with address 0xA, skipping [ 517.576764][ T8463] usb 1-1: config 0 interface 22 altsetting 1 endpoint 0x2 has invalid maxpacket 32, setting to 8 [ 517.587760][ T8463] usb 1-1: config 0 interface 22 altsetting 1 endpoint 0x5 has invalid maxpacket 1072, setting to 8 [ 517.598859][ T8463] usb 1-1: config 0 interface 22 altsetting 1 has a duplicate endpoint with address 0xA, skipping [ 517.610201][ T8463] usb 1-1: config 0 interface 22 altsetting 1 has a duplicate endpoint with address 0x2, skipping [ 517.621108][ T8463] usb 1-1: config 0 interface 22 altsetting 1 endpoint 0xE has invalid maxpacket 16, setting to 8 [ 517.632035][ T8463] usb 1-1: config 0 interface 22 altsetting 1 endpoint 0x1 has invalid maxpacket 64, setting to 8 [ 517.642971][ T8463] usb 1-1: config 0 interface 22 altsetting 1 endpoint 0x4 is Bulk; changing to Interrupt [ 517.653261][ T8463] usb 1-1: config 0 interface 22 altsetting 1 has a duplicate endpoint with address 0xA, skipping [ 517.664173][ T8463] usb 1-1: config 0 interface 22 altsetting 1 has a duplicate endpoint with address 0x8D, skipping [ 517.675169][ T8463] usb 1-1: config 0 interface 22 altsetting 1 has a duplicate endpoint with address 0xD, skipping [ 517.686075][ T8463] usb 1-1: config 0 interface 22 has no altsetting 0 19:12:56 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x1405, 0x1}, 0x10}}, 0x0) 19:12:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 518.375057][T13060] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 518.613569][T13098] bond12: (slave vlan13): making interface the new active one [ 518.628558][T13098] bond12: (slave vlan13): Enslaving as an active interface with an up link [ 518.873957][ T8463] usb 1-1: New USB device found, idVendor=0572, idProduct=86d6, bcdDevice=4d.cc [ 518.883493][ T8463] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 518.891648][ T8463] usb 1-1: Product: 촚으媓㑅筬៱࡜귌㤚ꨬ챿 乙鮲탬㊴﬇őä懒㷛櫺휗ï—꿺Ꮁ窑Õ䅬鱇温ᘕ鉿ì©å’¬èƒ¾î§›ì‹šç†–䤗à¬ë¼¦èªï©žî‚¼å•‹áª§âª½á°”í‘䨊ãṂ◇脷ဴ⺆뀙꾒昔틢Ḹ索∪ɛƹ쌨괵í¦â›«ì¦Œã¸žêŸ˜â¶¶ë”»ê¤ˆè„¾ï…é…ä‰áꆡⷀ镎銳堹î–晀ﮗ㒿﯎텸à¬ï¯ªã¥‘禎錊áˆâ°¾ã¶›â¸ˆ [ 518.926836][ T8463] usb 1-1: Manufacturer: 倊 [ 518.931585][ T8463] usb 1-1: SerialNumber:   [ 519.147142][ T8463] usb 1-1: config 0 descriptor?? [ 519.170219][T12994] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 519.208941][T12994] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 519.247942][T12994] raw-gadget gadget: fail, usb_ep_enable returned -22 19:12:58 executing program 0: r0 = fsopen(&(0x7f0000000140)='debugfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x2, 0x0, 0x0, 0x0) 19:12:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x1}]}) 19:12:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 19:12:58 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x1405, 0x1}, 0x10}}, 0x0) 19:12:58 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bind$bt_hci(r0, 0x0, 0x0) 19:12:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 519.460926][ T8463] dvb-usb: found a 'Conexant DMB-TH Stick' in warm state. [ 519.474030][ T8463] usb 1-1: setting power ON [ 519.478790][ T8463] dvb-usb: bulk message failed: -8 (2/0) [ 519.604629][T13111] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 519.639280][ T8463] dvb-usb: bulk message failed: -8 (1/0) 19:12:58 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000004700)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) [ 519.705103][ T24] audit: type=1326 audit(1639422778.390:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13106 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf6eb3549 code=0x0 19:12:58 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x6002, 0x0) [ 519.846954][T13117] bond13: (slave vlan14): making interface the new active one [ 519.862294][T13117] bond13: (slave vlan14): Enslaving as an active interface with an up link [ 519.921403][ T8463] dvb-usb: will pass the complete MPEG2 transport stream to the software demuxer. 19:12:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 19:12:58 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x1405, 0x1}, 0x10}}, 0x0) [ 520.114031][ T8463] dvbdev: DVB: registering new adapter (Conexant DMB-TH Stick) [ 520.121781][ T8463] usb 1-1: media controller created [ 520.274548][ T8463] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. 19:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/192, 0x1000000, 0xc0, 0x1}, 0x20) 19:12:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 520.686179][ T8463] cxusb: set interface failed 19:12:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000140)={'veth0_macvtap\x00', @ifru_data=&(0x7f0000000100)="0af625723406cf0d22b55668b9dcdc5f8e637dba0982c2a3d1bd8d02ba2254f5"}) 19:12:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 19:12:59 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x1, 0x0, 0x0, "", [{{0x8}, {0x8}}]}, 0x20}}, 0x0) 19:12:59 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000003b80), 0x0, 0x0) [ 521.388483][T13178] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:00 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000180)=0x7) 19:13:00 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x1, 0x0, 0x0, "", [{{0x8}, {0x8}}]}, 0x20}}, 0x0) 19:13:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 19:13:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000340)='GPL\x00', 0x5, 0xa5, &(0x7f0000000380)=""/165, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 521.863421][ T8463] dvb-usb: bulk message failed: -8 (3/0) [ 521.869284][ T8463] cxusb: clear tuner gpio failed [ 521.874753][ T8463] dvb-usb: no frontend was attached by 'Conexant DMB-TH Stick' 19:13:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:13:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) 19:13:00 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x280040, 0x0) [ 522.233596][ T8463] rc_core: IR keymap rc-total-media-in-hand-02 not found [ 522.240765][ T8463] Registered IR keymap rc-empty [ 522.247517][ T8463] rc rc0: Conexant DMB-TH Stick as /devices/platform/dummy_hcd.0/usb1/1-1/rc/rc0 [ 522.259275][ T8463] input: Conexant DMB-TH Stick as /devices/platform/dummy_hcd.0/usb1/1-1/rc/rc0/input5 19:13:01 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x1405, 0x1, 0x0, 0x0, "", [{{0x8}, {0x8}}]}, 0x20}}, 0x0) 19:13:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) [ 522.440362][ T8463] dvb-usb: schedule remote query interval to 100 msecs. [ 522.448336][ T8463] usb 1-1: setting power OFF [ 522.453398][ T8463] dvb-usb: bulk message failed: -8 (2/0) [ 522.459160][ T8463] dvb-usb: Conexant DMB-TH Stick successfully initialized and connected. 19:13:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/229, 0x18, 0xe5, 0x1}, 0x20) [ 522.636834][T13242] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 522.676434][ T2827] dvb-usb: bulk message failed: -8 (1/0) [ 522.684136][ T8463] usb 1-1: USB disconnect, device number 3 19:13:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@volatile={0x2}]}, {0x0, [0x0]}}, &(0x7f00000001c0)=""/130, 0x27, 0x82, 0x1}, 0x20) [ 522.833760][T13245] 8021q: adding VLAN 0 to HW filter on device bond15 [ 522.851630][T13245] bond0: (slave bond15): Enslaving as an active interface with an up link [ 523.036499][ T8463] dvb-usb: Conexant DMB-TH Stick successfully deinitialized and disconnected. 19:13:01 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x5, 0x1) write$evdev(r0, 0x0, 0x0) 19:13:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:13:02 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 19:13:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 19:13:02 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000004c0)={0x1f, 0x0, 0x1}, 0x6) 19:13:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0162) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x102, 0x0) pwrite64(r3, &(0x7f0000000180)='\v', 0x7fb1, 0x33) 19:13:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = getpgid(0x0) sendmsg$netlink(r0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x40}, 0x0) [ 523.954539][T13306] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) [ 524.106427][T13326] 8021q: adding VLAN 0 to HW filter on device bond16 [ 524.122754][T13326] bond0: (slave bond16): Enslaving as an active interface with an up link 19:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000025c0)={&(0x7f0000002400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@union={0x3}]}, {0x0, [0x0, 0x0, 0x5f, 0x30, 0x2e]}}, &(0x7f0000002500)=""/170, 0x2b, 0xaa, 0x1}, 0x20) 19:13:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x34}}, 0x0) 19:13:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:13:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) ioctl$sock_SIOCINQ(r1, 0x4020940d, &(0x7f0000000100)) 19:13:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x34}}, 0x0) 19:13:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000140)={'veth0_macvtap\x00', @ifru_data=&(0x7f0000000100)="210000003406cf0d22b55668b9dcdc5f8e637dba0982c2a3d1bd8d02ba2254f5"}) [ 524.864462][T13358] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 524.974967][T13360] 8021q: adding VLAN 0 to HW filter on device bond17 [ 524.989216][T13360] bond0: (slave bond17): Enslaving as an active interface with an up link 19:13:03 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000340), &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303038313032303030302c667363616368652ce3616368657461673d776f72742c63616368657461673d7472616e733d7463702c2c00"]) clone(0x12a00c80, &(0x7f0000000040)="e3d63bd238839235fa2d882879a5a61a5147132f780dfda6d6f62cb6eb0139e9d3b103d5ede5cd2d363852550c3befba691d08adbcaac7aee6b367", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) statx(r0, &(0x7f0000000380)='./file0\x00', 0x100, 0x200, &(0x7f0000000400)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@initdev, @in6}}, {{@in=@remote}}}, &(0x7f0000000600)=0xe8) fstat(r0, &(0x7f0000000780)) read$FUSE(0xffffffffffffffff, &(0x7f0000000800)={0x2020}, 0x2020) 19:13:03 executing program 0: syz_read_part_table(0xfffffffffffffff8, 0x1, &(0x7f00000004c0)=[{&(0x7f0000000100)="fb5b6edf4910e24af2cd42ffcb6ae2dabdfecc4791e055344cecd88fd905937048d2a08ad08f457f5bbf5b6e", 0x2c, 0xdab}]) 19:13:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:13:04 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000003b80)=[{&(0x7f0000002980)="e0", 0x1}, {&(0x7f0000003980)='q', 0x1}, {&(0x7f0000003a80)='Q', 0x1}, {&(0x7f0000003b00)="b2", 0x1}], 0x0, 0x0) 19:13:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000140)={'veth0_macvtap\x00', @ifru_data=&(0x7f0000000100)="020000003406cf0d22b55668b9dcdc5f8e637dba0982c2a3d1bd8d02ba2254f5"}) 19:13:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x34}}, 0x0) 19:13:04 executing program 4: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000540)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@caif=@dbg, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/159, 0x9f}, {&(0x7f0000000140)=""/175, 0xaf}, {&(0x7f0000000200)=""/152, 0x98}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/48, 0x30}, {&(0x7f0000000380)=""/30, 0x1e}], 0x6, &(0x7f0000000440)=""/160, 0xa0}, 0x0, 0x40000022, 0x0, {0x3}}, 0x4) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000600), 0x400a01, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000640)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r2 = getuid() syz_mount_image$fuse(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10900, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xffffffffffffff80}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x5}}], [{@fowner_gt={'fowner>', r2}}]}}) syz_mount_image$ext4(&(0x7f00000028c0)='ext4\x00', &(0x7f0000002900)='./file0\x00', 0x4, 0x5, &(0x7f0000003b80)=[{&(0x7f0000002940)="8a900c0e2b307c4edb37908aa3190ec0efdc857ab2bd7f23ff", 0x19, 0x1000}, {&(0x7f0000002980)="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", 0x1000, 0x3}, {&(0x7f0000003980)="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", 0xfd, 0x200}, {&(0x7f0000003a80)="518d5c6c1bfb6a6789fe8d1a72145203bc8547c7714eae25088532aacd438fd68f563c509f8fbf56182c9f1659c5b0caf237e64ab16c007d5350bfbbd71bc65b5c8d3b1b3ce1d816bdc587d2e8375b15", 0x50, 0x9}, {&(0x7f0000003b00)="b21bec96aab576873e2b98f4cce7338571172671b522a1560cdd52b7e5468ecbec37826d97d24aa95729f90a9ff815083c4ae32aa5fa7ddd1297b8ae9518379126ea133f", 0x44, 0x400}], 0x80, &(0x7f0000003c00)={[{@errors_continue}, {@stripe={'stripe', 0x3d, 0xfff}}, {@resuid={'resuid', 0x3d, r2}}, {@sb={'sb', 0x3d, 0x7}}, {@nogrpid}, {@discard}, {@noauto_da_alloc}, {@debug}], [{@smackfshat={'smackfshat', 0x3d, '\xc3'}}, {@fowner_gt={'fowner>', r2}}, {@appraise_type}]}) [ 525.734127][T13405] loop0: detected capacity change from 0 to 264192 19:13:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 525.995041][T13413] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000035c0)={'tunl0\x00', &(0x7f0000003540)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 19:13:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x2e, 0x0, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x0, 0x0, 0x1, 0x1}}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x40}}, 0x0) [ 526.316645][T13453] 8021q: adding VLAN 0 to HW filter on device bond18 [ 526.335009][T13453] bond0: (slave bond18): Enslaving as an active interface with an up link [ 526.562043][T13458] fuse: Bad value for 'fd' 19:13:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1], 0x34}}, 0x0) 19:13:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 526.599320][T13461] loop4: detected capacity change from 0 to 16 [ 526.698605][T13461] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 526.781420][T13467] loop0: detected capacity change from 0 to 16 19:13:05 executing program 2: socket(0x2, 0x0, 0x700) 19:13:05 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000004580)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40305828, 0x0) [ 526.938169][ T24] audit: type=1804 audit(1639422785.630:24): pid=13467 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir382411912/syzkaller.tUAfKO/251/file0/bus" dev="loop0" ino=1048592 res=1 errno=0 [ 527.033568][T13467] syz-executor.0: attempt to access beyond end of device [ 527.033568][T13467] loop0: rw=2049, want=17, limit=16 19:13:06 executing program 3: openat$vsock(0xffffffffffffff9c, 0x0, 0x400a01, 0x0) 19:13:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 527.563654][T13481] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1], 0x34}}, 0x0) 19:13:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 527.767259][T13485] 8021q: adding VLAN 0 to HW filter on device bond19 [ 527.781511][T13485] bond0: (slave bond19): Enslaving as an active interface with an up link 19:13:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) 19:13:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:13:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1], 0x34}}, 0x0) 19:13:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x2}]}}, &(0x7f0000000280)=""/229, 0x26, 0xe5, 0x1}, 0x20) [ 528.302430][T13530] loop0: detected capacity change from 0 to 16 [ 528.407562][T13534] loop2: detected capacity change from 0 to 16 [ 528.439908][ T24] audit: type=1804 audit(1639422787.130:25): pid=13530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir382411912/syzkaller.tUAfKO/252/file0/bus" dev="sda1" ino=14883 res=1 errno=0 19:13:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 528.646268][ T24] audit: type=1804 audit(1639422787.240:26): pid=13539 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir128070906/syzkaller.DvnssZ/255/file0/bus" dev="sda1" ino=13971 res=1 errno=0 [ 528.835489][T13544] loop4: detected capacity change from 0 to 16 19:13:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 528.970780][ T24] audit: type=1804 audit(1639422787.660:27): pid=13544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir593230955/syzkaller.sQa0yu/258/file0/bus" dev="sda1" ino=15095 res=1 errno=0 [ 529.043353][T13548] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:07 executing program 3: socket(0x5, 0x0, 0x0) [ 529.237201][T13575] loop0: detected capacity change from 0 to 16 19:13:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB], 0x34}}, 0x0) [ 529.343226][T13572] 8021q: adding VLAN 0 to HW filter on device bond20 [ 529.358346][T13572] bond0: (slave bond20): Enslaving as an active interface with an up link [ 529.370691][ T24] audit: type=1804 audit(1639422788.060:28): pid=13575 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir382411912/syzkaller.tUAfKO/253/file0/bus" dev="loop0" ino=1048593 res=1 errno=0 [ 529.484256][T13575] syz-executor.0: attempt to access beyond end of device [ 529.484256][T13575] loop0: rw=2049, want=17, limit=16 19:13:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) 19:13:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) 19:13:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 530.154819][T13603] loop2: detected capacity change from 0 to 16 19:13:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB], 0x34}}, 0x0) [ 530.279809][ T24] audit: type=1804 audit(1639422788.970:29): pid=13603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir128070906/syzkaller.DvnssZ/256/file0/bus" dev="sda1" ino=14338 res=1 errno=0 19:13:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x1) write$evdev(r0, &(0x7f00000002c0)=[{{0x0, 0xea60}}], 0x7ffff000) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000000)=""/194) [ 530.577193][T13610] loop4: detected capacity change from 0 to 16 [ 530.757684][ T24] audit: type=1804 audit(1639422789.450:30): pid=13616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir593230955/syzkaller.sQa0yu/259/bus" dev="sda1" ino=15100 res=1 errno=0 19:13:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 530.800471][T13617] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 530.954079][T13622] loop0: detected capacity change from 0 to 16 [ 530.979384][T13628] 8021q: adding VLAN 0 to HW filter on device bond21 [ 530.995364][T13628] bond0: (slave bond21): Enslaving as an active interface with an up link [ 531.179524][ T24] audit: type=1804 audit(1639422789.810:31): pid=13664 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir382411912/syzkaller.tUAfKO/254/bus" dev="sda1" ino=14818 res=1 errno=0 19:13:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) 19:13:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB], 0x34}}, 0x0) 19:13:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 532.023750][T13673] loop2: detected capacity change from 0 to 16 [ 532.188575][ T24] audit: type=1804 audit(1639422790.880:32): pid=13673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir128070906/syzkaller.DvnssZ/257/file0/bus" dev="sda1" ino=14865 res=1 errno=0 [ 532.436910][T13681] loop4: detected capacity change from 0 to 16 [ 532.604074][ T24] audit: type=1804 audit(1639422791.290:33): pid=13689 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir593230955/syzkaller.sQa0yu/260/bus" dev="sda1" ino=15109 res=1 errno=0 19:13:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000140)={'veth0_macvtap\x00', @ifru_data=&(0x7f0000000100)="170000003406cf0d22b55668b9dcdc5f8e637dba0982c2a3d1bd8d02ba2254f5"}) [ 532.815728][T13691] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000000000040141"], 0x34}}, 0x0) 19:13:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000080)=@framed={{}, [@initr0, @initr0]}, &(0x7f00000001c0)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 533.074518][T13694] 8021q: adding VLAN 0 to HW filter on device bond22 [ 533.222638][T13694] bond0: (slave bond22): Enslaving as an active interface with an up link 19:13:12 executing program 4: syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x141602) 19:13:12 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f00000004c0)=[{0x0, 0x0, 0xdab}, {0x0, 0x0, 0x7}, {0x0}]) 19:13:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:13:12 executing program 2: r0 = socket(0x11, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) [ 534.147135][T13741] loop0: detected capacity change from 0 to 13 [ 534.329357][T13741] Dev loop0: unable to read RDB block 13 [ 534.335573][T13741] loop0: unable to read partition table [ 534.376298][T13746] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 534.396895][T13741] loop0: partition table beyond EOD, truncated [ 534.403668][T13741] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 534.646479][T13770] 8021q: adding VLAN 0 to HW filter on device bond23 [ 534.660694][T13770] bond0: (slave bond23): Enslaving as an active interface with an up link 19:13:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$xdp(r0, &(0x7f0000002c40)={&(0x7f0000002700), 0x10, 0x0, 0x40000}, 0x0) 19:13:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000000000040141"], 0x34}}, 0x0) 19:13:32 executing program 4: r0 = fsopen(&(0x7f0000000140)='debugfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x5, &(0x7f0000000180)='silent\x00', 0x0, 0x0) 19:13:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000140)={'veth0_macvtap\x00', @ifru_data=&(0x7f0000000100)="0a0000003406cf0d22b55668b9dcdc5f8e637dba0982c2a3d1bd8d02ba2254f5"}) 19:13:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000140)={'veth0_macvtap\x00', @ifru_data=&(0x7f0000000100)="490000003406cf0d22b55668b9dcdc5f8e637dba0982c2a3d1bd8d02ba2254f5"}) 19:13:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 554.547550][T13801] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xa, 0x2}]}]}}, &(0x7f0000000280)=""/229, 0x2e, 0xe5, 0x1}, 0x20) 19:13:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000000000040141"], 0x34}}, 0x0) 19:13:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', 0x0, 0x0, 0x2, &(0x7f0000000580)=[{&(0x7f0000000480)="fc", 0x1, 0x80000001}, {&(0x7f0000000540)='v', 0x1}], 0x0, &(0x7f0000002600)) 19:13:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{}, "fb19bbf590cf3e2c", "74bdaf4adbb6c68f433147e2ea023324e8efef477ea921904061aab0e4d4fc4b", "10470f08", "bcf7b6d22134f52d"}, 0x38) [ 554.923513][T13831] 8021q: adding VLAN 0 to HW filter on device bond24 [ 554.937869][T13831] bond0: (slave bond24): Enslaving as an active interface with an up link 19:13:33 executing program 3: sched_getattr(0x0, &(0x7f00000018c0)={0x38}, 0x38, 0x0) 19:13:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:13:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000"], 0x34}}, 0x0) 19:13:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@abs, 0x6e) [ 555.376481][T13847] loop2: detected capacity change from 0 to 264192 19:13:34 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, r1) 19:13:34 executing program 2: setitimer(0x1, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) 19:13:34 executing program 3: openat$cgroup_root(0xffffff9c, &(0x7f0000000a00)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 555.871582][T13857] tipc: Enabling of bearer <> rejected, illegal name [ 555.960545][T13858] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000"], 0x34}}, 0x0) [ 556.285009][T13894] 8021q: adding VLAN 0 to HW filter on device bond25 [ 556.299879][T13894] bond0: (slave bond25): Enslaving as an active interface with an up link 19:13:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r0, 0x0, 0x0) 19:13:35 executing program 3: openat$procfs(0xffffff9c, &(0x7f00000007c0)='/proc/zoneinfo\x00', 0x0, 0x0) 19:13:35 executing program 2: openat$apparmor_thread_exec(0xffffff9c, &(0x7f0000002940), 0x2, 0x0) 19:13:35 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0xfffffffffffffffc) 19:13:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 556.803418][T13906] tipc: Enabling of bearer <> rejected, illegal name 19:13:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000"], 0x34}}, 0x0) 19:13:35 executing program 3: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000001c0)) 19:13:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x8, 0x4) [ 557.119086][T13913] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:35 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r0) [ 557.345065][T13950] 8021q: adding VLAN 0 to HW filter on device bond26 [ 557.363406][T13950] bond0: (slave bond26): Enslaving as an active interface with an up link 19:13:36 executing program 4: openat$procfs(0xffffff9c, &(0x7f0000001180)='/proc/tty/ldiscs\x00', 0x0, 0x0) [ 557.483366][T13955] tipc: Enabling of bearer <> rejected, illegal name 19:13:36 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000240)='/proc/slabinfo\x00', 0x0, 0x0) read$msr(r0, 0x0, 0x0) 19:13:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000000000040141000000180017000000000000000065"], 0x34}}, 0x0) 19:13:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:13:36 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "d88cde9ff4502f8ef9b14e1f3c5ca4b9341ae963164cbbaa81482a1b72ec4ae8175bf830e145c7da2007dfbf7db18b3abf03e86143defc670f8f38c6c36bcbf7"}, 0x48, 0xfffffffffffffffb) 19:13:36 executing program 2: r0 = openat$procfs(0xffffff9c, &(0x7f0000001000)='/proc/stat\x00', 0x0, 0x0) timerfd_gettime(r0, 0x0) [ 558.131578][T13966] tipc: Enabling of bearer rejected, illegal name 19:13:37 executing program 3: add_key(&(0x7f0000000a80)='logon\x00', &(0x7f0000000ac0)={'syz', 0x2}, &(0x7f0000000b00)="06", 0x1, 0xffffffffffffffff) 19:13:37 executing program 4: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000100)={0x0, r0+10000000}, 0x0) [ 558.296346][T13970] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000000000040141000000180017000000000000000065"], 0x34}}, 0x0) 19:13:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x10, 0x0, &(0x7f0000000040)) [ 558.556121][T13973] 8021q: adding VLAN 0 to HW filter on device bond27 [ 558.570312][T13973] bond0: (slave bond27): Enslaving as an active interface with an up link 19:13:37 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f00000007c0)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 19:13:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) 19:13:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 559.079976][T14016] tipc: Enabling of bearer rejected, illegal name 19:13:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000001300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast1}}}}, &(0x7f0000001380)=0x80) 19:13:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000000000040141000000180017000000000000000065"], 0x34}}, 0x0) 19:13:38 executing program 0: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_gettime(0x0, 0x0) [ 559.487664][T14023] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 559.631878][T14025] 8021q: adding VLAN 0 to HW filter on device bond28 [ 559.648007][T14025] bond0: (slave bond28): Enslaving as an active interface with an up link 19:13:38 executing program 2: getresuid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f0000001800)) 19:13:38 executing program 4: sysfs$2(0x2, 0x3, &(0x7f0000000380)=""/88) [ 559.936063][T14063] tipc: Enabling of bearer rejected, illegal name 19:13:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x10101) 19:13:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:13:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000010000000000000401410000001800170000000000000000657468"], 0x34}}, 0x0) 19:13:38 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "af89abea3356f2deb143f60113f3882e5e5b91eb293cf774c6cfbb7c474a0b974cd1cad8d2c4216e6d4f800e3a9aec4998f5e213baa667c8ece55ace2189b501"}, 0x48, r0) keyctl$search(0xa, r1, &(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0) 19:13:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, @phonet, @in={0x2, 0x0, @private}, @can, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='bond_slave_0\x00'}) 19:13:39 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) add_key(&(0x7f0000000080)='encrypted\x00', 0x0, 0x0, 0x0, r0) [ 560.691331][T14075] tipc: Enabling of bearer rejected, illegal name 19:13:39 executing program 3: setitimer(0x2, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) 19:13:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000010000000000000401410000001800170000000000000000657468"], 0x34}}, 0x0) [ 560.818680][T14077] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 560.989425][T14080] 8021q: adding VLAN 0 to HW filter on device bond29 [ 561.004118][T14080] bond0: (slave bond29): Enslaving as an active interface with an up link 19:13:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002380)={0x0, 0x0, 0x0}, 0x0) 19:13:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x4c}}, 0x0) 19:13:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, @phonet, @in={0x2, 0x0, @private}, @can, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='bond_slave_0\x00'}) 19:13:40 executing program 3: add_key(&(0x7f0000000a80)='logon\x00', &(0x7f0000000ac0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 19:13:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf={0x480, &(0x7f0000000380)="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"}) [ 561.573399][T14121] tipc: Enabling of bearer rejected, illegal name 19:13:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000010000000000000401410000001800170000000000000000657468"], 0x34}}, 0x0) 19:13:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x17, 0x0, &(0x7f0000000000)) [ 561.884613][T14126] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 562.122187][T14167] 8021q: adding VLAN 0 to HW filter on device bond30 [ 562.138087][T14167] bond0: (slave bond30): Enslaving as an active interface with an up link 19:13:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, @phonet, @in={0x2, 0x0, @private}, @can, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='bond_slave_0\x00'}) 19:13:41 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x1}, &(0x7f0000000140), 0x0) 19:13:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x7, 0x4) [ 562.436036][T14174] tipc: Enabling of bearer rejected, illegal name 19:13:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x4c}}, 0x0) 19:13:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x3) 19:13:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a"], 0x34}}, 0x0) 19:13:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, @phonet, @in={0x2, 0x0, @private}, @can, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='bond_slave_0\x00'}) 19:13:41 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f00000000c0)='/proc/consoles\x00', 0x0, 0x0) read$msr(r0, &(0x7f00000002c0)=""/4096, 0x1000) 19:13:41 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) [ 563.066137][T14186] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 563.304984][T14225] 8021q: adding VLAN 0 to HW filter on device bond31 [ 563.319479][T14225] bond0: (slave bond31): Enslaving as an active interface with an up link [ 563.349161][T14224] tipc: Enabling of bearer rejected, illegal name 19:13:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a"], 0x34}}, 0x0) 19:13:42 executing program 0: keyctl$link(0x8, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "d88cde9ff4502f8ef9b14e1f3c5ca4b9341ae963164cbbaa81482a1b72ec4ae8175bf830e145c7da2007dfbf7db18b3abf03e86143defc670f8f38c6c36bcbf7"}, 0x48, 0xfffffffffffffffb) keyctl$get_security(0x11, r0, 0x0, 0x0) 19:13:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x4c}}, 0x0) 19:13:42 executing program 3: mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 19:13:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x208e24b) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) bind$inet6(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff006}], 0x5, 0x0, 0x0) 19:13:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='wlan1\x00', 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000008680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003440)=[{&(0x7f00000031c0)=':', 0x1}], 0x1}}], 0x2, 0xf000) 19:13:42 executing program 0: epoll_create1(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c2, 0x90080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, 0x0, 0x4000000) fork() tkill(0x0, 0x1b) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0}, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x3, 0x3}, 0x6) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r3) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="0900000083c06576f811ffe9ed32df2809a45473fc929ab91be1918a9c1f27712a69d6bd8f34bd1e82526c401bca7a678c8117322006b0cd0416032f0ba0b842fd3cede42f029536d586a5d5c92c793f453561", @ANYRES16=r4, @ANYBLOB="000125bd7000fbdbdf251200000008000700000000000c00018008000300047e045708000600030f00000800070005000000"], 0x38}, 0x1, 0x0, 0x0, 0x4040000}, 0x48041) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000280)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x1, 0x4d}}}}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x80}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x20}, @NL80211_ATTR_BSS_HT_OPMODE={0x6}, @NL80211_ATTR_P2P_OPPPS={0x5}, @NL80211_ATTR_P2P_CTWINDOW={0x5}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x80}, @NL80211_ATTR_P2P_OPPPS={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x400008c0}, 0x8000) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7e1d0fafb7740b8737b3aea07e090ace83d06f268cc991b0be4307a2511137653332e417c62175192a92c911551d6ffcf9f53603d0356ff15ba6e7039b54acd31c093a6c009bc478bebd432e76e8379d2d814ad6e873252f4457440a132b7392b1d510eb517f1af8220e2cf09b1503287028eaa8ad343aad347aaa23c50d9768eeda7ebc26da5054317cd7c82b6869854bc16597cfb973d42839b6cbf4e090e1809208c92c29c93b0fded7f8328419366e18c1ff8146b3c51401c0d1dcedb89961be46b244ade6f59f4241e6fa7bcd4a0f6c7a809a0e61a9f0a02a9b75d81325f08667736070ec337f4916f5f67bd65898c6ddcde8806d099d6f881df84dd235a7"], 0xd) lseek(0xffffffffffffffff, 0x8, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x20000804) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x4004081) [ 564.203596][T14244] tipc: Enabling of bearer rejected, illegal name 19:13:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x4000000, &(0x7f0000000000)={&(0x7f0000000640)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}, @IFLA_IFALIASn={0x4}]}, 0x2c}}, 0x0) 19:13:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a"], 0x34}}, 0x0) [ 564.368340][T14247] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 564.568617][T14286] 8021q: adding VLAN 0 to HW filter on device bond32 [ 564.583719][T14286] bond0: (slave bond32): Enslaving as an active interface with an up link [ 564.766842][T14291] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 564.787636][T14291] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 564.795899][T14291] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 19:13:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x3000000, &(0x7f0000000000)={&(0x7f0000000640)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}, @IFLA_IFALIASn={0x4}]}, 0x2c}}, 0x0) 19:13:43 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000100)=ANY=[], 0x1c) 19:13:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 565.437728][T14296] tipc: Enabling of bearer rejected, illegal name 19:13:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 565.942436][T14305] ======================================================= [ 565.942436][T14305] WARNING: The mand mount option has been deprecated and [ 565.942436][T14305] and is ignored by this kernel. Remove the mand [ 565.942436][T14305] option from the mount to silence this warning. [ 565.942436][T14305] ======================================================= 19:13:44 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff1000/0x2000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0}, 0x68) 19:13:44 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x4) getsockopt$inet6_mreq(r0, 0x29, 0x1a, 0x0, &(0x7f0000000080)) [ 566.279276][T14307] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 566.463609][T14343] 8021q: adding VLAN 0 to HW filter on device bond33 [ 566.484873][T14343] bond0: (slave bond33): Enslaving as an active interface with an up link 19:13:45 executing program 0: epoll_create1(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c2, 0x90080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, 0x0, 0x4000000) fork() tkill(0x0, 0x1b) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0}, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x3, 0x3}, 0x6) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r3) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="0900000083c06576f811ffe9ed32df2809a45473fc929ab91be1918a9c1f27712a69d6bd8f34bd1e82526c401bca7a678c8117322006b0cd0416032f0ba0b842fd3cede42f029536d586a5d5c92c793f453561", @ANYRES16=r4, @ANYBLOB="000125bd7000fbdbdf251200000008000700000000000c00018008000300047e045708000600030f00000800070005000000"], 0x38}, 0x1, 0x0, 0x0, 0x4040000}, 0x48041) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000280)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x1, 0x4d}}}}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x80}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x20}, @NL80211_ATTR_BSS_HT_OPMODE={0x6}, @NL80211_ATTR_P2P_OPPPS={0x5}, @NL80211_ATTR_P2P_CTWINDOW={0x5}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x80}, @NL80211_ATTR_P2P_OPPPS={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x400008c0}, 0x8000) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xd) lseek(0xffffffffffffffff, 0x8, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x20000804) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x4004081) 19:13:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x2012, r0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xffffff0f) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 19:13:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:13:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:13:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 19:13:45 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) write$binfmt_script(r0, 0x0, 0x0) 19:13:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 567.964790][T14365] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:47 executing program 0: epoll_create1(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c2, 0x90080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, 0x0, 0x4000000) fork() tkill(0x0, 0x1b) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0}, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x3, 0x3}, 0x6) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r3) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="0900000083c06576f811ffe9ed32df2809a45473fc929ab91be1918a9c1f27712a69d6bd8f34bd1e82526c401bca7a678c8117322006b0cd0416032f0ba0b842fd3cede42f029536d586a5d5c92c793f453561", @ANYRES16=r4, @ANYBLOB="000125bd7000fbdbdf251200000008000700000000000c00018008000300047e045708000600030f00000800070005000000"], 0x38}, 0x1, 0x0, 0x0, 0x4040000}, 0x48041) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000280)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x1, 0x4d}}}}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x80}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x20}, @NL80211_ATTR_BSS_HT_OPMODE={0x6}, @NL80211_ATTR_P2P_OPPPS={0x5}, @NL80211_ATTR_P2P_CTWINDOW={0x5}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x80}, @NL80211_ATTR_P2P_OPPPS={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x400008c0}, 0x8000) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xd) lseek(0xffffffffffffffff, 0x8, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x20000804) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x4004081) 19:13:47 executing program 4: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="021e0500000002000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:13:47 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) write$binfmt_script(r0, 0x0, 0x0) 19:13:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000540)) 19:13:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:13:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 569.340233][T14416] loop4: detected capacity change from 0 to 1 [ 569.455448][T14416] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 569.460980][T14416] loop4: partition table partially beyond EOD, truncated [ 569.469137][T14416] loop4: p1 start 2 is beyond EOD, truncated [ 569.475461][T14416] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 569.600613][T14426] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:48 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f0000ff1000/0x2000)=nil, 0x2000, 0x0, 0x8111, r0, 0x0) 19:13:48 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) write$binfmt_script(r0, 0x0, 0x0) [ 569.688493][T14416] loop4: p3 size 2 extends beyond EOD, truncated [ 569.823461][T14416] loop4: p4 size 32768 extends beyond EOD, truncated [ 569.970524][T14416] loop4: p5 size 1073741824 extends beyond EOD, truncated 19:13:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 570.069169][T14416] loop4: p6 size 32768 extends beyond EOD, truncated 19:13:49 executing program 4: fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:13:49 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r7, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x4c}}, 0x0) 19:13:49 executing program 0: epoll_create1(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c2, 0x90080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, 0x0, 0x4000000) fork() tkill(0x0, 0x1b) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0}, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x3, 0x3}, 0x6) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r3) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="0900000083c06576f811ffe9ed32df2809a45473fc929ab91be1918a9c1f27712a69d6bd8f34bd1e82526c401bca7a678c8117322006b0cd0416032f0ba0b842fd3cede42f029536d586a5d5c92c793f453561", @ANYRES16=r4, @ANYBLOB="000125bd7000fbdbdf251200000008000700000000000c00018008000300047e045708000600030f00000800070005000000"], 0x38}, 0x1, 0x0, 0x0, 0x4040000}, 0x48041) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000280)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x1, 0x4d}}}}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x80}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x20}, @NL80211_ATTR_BSS_HT_OPMODE={0x6}, @NL80211_ATTR_P2P_OPPPS={0x5}, @NL80211_ATTR_P2P_CTWINDOW={0x5}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x80}, @NL80211_ATTR_P2P_OPPPS={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x400008c0}, 0x8000) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xd) lseek(0xffffffffffffffff, 0x8, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x20000804) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x4004081) 19:13:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000fc0)) 19:13:49 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) write$binfmt_script(r0, 0x0, 0x0) 19:13:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:13:49 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)) 19:13:50 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#]-\x00', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000ac0), 0x40) 19:13:50 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r7, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x4c}}, 0x0) 19:13:50 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MULTICAST_ROUTER={0x5, 0x19, 0xff}]}}}]}, 0x44}}, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 19:13:50 executing program 3: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3000001, 0x4106832, 0xffffffffffffffff, 0x0) 19:13:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:13:51 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)) 19:13:51 executing program 2: pipe(&(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r0, 0x9) 19:13:51 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r7, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x4c}}, 0x0) 19:13:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:13:51 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @random="eb0952c85105"}, 0x10) 19:13:51 executing program 3: socketpair(0x2, 0x3, 0x20, 0x0) 19:13:52 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)) 19:13:52 executing program 2: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x300001d, 0x100832, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001280)='ns/ipc\x00') 19:13:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:13:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000540), 0x2bf70) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40c00002c) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x0, 0x5, 0x0, 0x3, 0x0, 0xc4d2, 0x208, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x10}, 0x0, 0xfffffffffffffff8, 0x80000001, 0x0, 0x0, 0xd853, 0x8001, 0x0, 0x3a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 19:13:52 executing program 3: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:13:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000540), 0x2bf70) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40c00002c) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0xc7, 0x5, 0x0, 0x3, 0x0, 0xc4d2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x10}, 0x0, 0xfffffffffffffff8, 0x80000001, 0x9, 0x0, 0xd853, 0x8001, 0x0, 0x3a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) 19:13:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:13:52 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)) 19:13:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:13:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000540), 0x2bf70) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40c00002c) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0xc7, 0x5, 0x0, 0x3, 0x0, 0xc4d2, 0x208, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x10}, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0xd853, 0x8001, 0x0, 0x3a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 574.963812][T14568] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 575.071641][T14568] bond36 (uninitialized): Released all slaves 19:13:53 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000000)) 19:13:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:13:54 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000), 0x2, 0x2) 19:13:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:13:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 575.926651][T14589] loop4: detected capacity change from 0 to 178 [ 576.067397][T14589] read_mapping_page failed! [ 576.072351][T14589] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:13:54 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000200)) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) [ 576.158110][T14589] Mount JFS Failure: -5 [ 576.162735][T14589] jfs_mount failed w/return code = -5 19:13:54 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, 0x0) [ 576.351406][T14600] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 576.390553][T14600] bond36 (uninitialized): Released all slaves 19:13:55 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) [ 576.436966][ T1199] ieee802154 phy0 wpan0: encryption failed: -22 [ 576.443585][ T1199] ieee802154 phy1 wpan1: encryption failed: -22 19:13:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:13:55 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000040)={0x0, 0x7f}) 19:13:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:13:56 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000200)) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) [ 577.326374][T14618] loop4: detected capacity change from 0 to 178 19:13:56 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, 0x0) [ 577.462188][T14618] read_mapping_page failed! [ 577.467395][T14618] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:13:56 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000040)={0x0, 0x7f}) [ 577.538565][T14618] Mount JFS Failure: -5 [ 577.543335][T14618] jfs_mount failed w/return code = -5 19:13:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 577.647870][T14624] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 577.709946][T14624] bond36 (uninitialized): Released all slaves 19:13:56 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:13:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:13:57 executing program 0: ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) 19:13:57 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000200)) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) 19:13:57 executing program 2: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000320700000100000000010000000f", 0x4e, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000014700)="10c4645f100000000200000001000000040000001c00000028000000000000000000000000000000030000000000000000000000ed41", 0x36, 0x1c400}, {&(0x7f0000014800)="000000000000000000000000000000008305030602000000050102030400000020000000ff05660069006c00650030000000000000000000000000000200000004000000ff05660069006c00650031", 0x4f, 0x1c4e0}, {&(0x7f0000015200)="ffffffff01000000400000003600000004", 0x11, 0x20000}, {&(0x7f0000015e00)="040000001c0000000400000024", 0xd, 0x21c00}, {&(0x7f0000016000)="10c4645f10000000200000000100000004000000240000001000000000000000000000000000000002", 0x29, 0x24000}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f000006d200)) statx(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000004180)) 19:13:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 578.608008][T14648] loop4: detected capacity change from 0 to 178 [ 578.751156][T14648] read_mapping_page failed! [ 578.758921][T14648] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 578.851453][T14655] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 578.870975][T14648] Mount JFS Failure: -5 [ 578.876022][T14648] jfs_mount failed w/return code = -5 19:13:57 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000180)) [ 579.154484][T14698] loop2: detected capacity change from 0 to 61456 19:13:57 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:13:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:13:58 executing program 2: pipe(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 19:13:58 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000200)) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) 19:13:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) [ 579.729216][T14712] loop4: detected capacity change from 0 to 178 19:13:58 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000080)=0x2b31, 0x4) [ 579.797480][T14712] read_mapping_page failed! [ 579.802287][T14712] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 579.870475][T14712] Mount JFS Failure: -5 [ 579.875150][T14712] jfs_mount failed w/return code = -5 19:13:58 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:13:58 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000340)={0xffffffff}, 0x10) [ 580.080590][T14724] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:13:58 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) 19:13:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:13:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/fib_trie\x00') fallocate(r0, 0x21, 0x0, 0x9) 19:13:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:13:59 executing program 3: ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) [ 580.848330][T14774] loop4: detected capacity change from 0 to 178 19:13:59 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x0, 0x0, 0x0) 19:13:59 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:13:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:13:59 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x0) [ 581.304673][T14785] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:14:00 executing program 3: ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) 19:14:00 executing program 2: setuid(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x220, 0x0) [ 581.675281][T14833] loop4: detected capacity change from 0 to 178 19:14:00 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 19:14:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000000000004014100000018001700000000000000006574683a6b"], 0x34}}, 0x0) 19:14:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:14:01 executing program 3: ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) 19:14:01 executing program 2: r0 = socket$inet6(0x18, 0x4003, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x1, &(0x7f0000000140)={0x18}, 0xc) [ 582.578733][T14849] loop4: detected capacity change from 0 to 178 [ 582.654013][T14854] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:14:01 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) munmap(&(0x7f0000ff3000/0xc000)=nil, 0xc000) [ 582.757548][T14854] bond39 (uninitialized): Released all slaves 19:14:01 executing program 5: r0 = socket$inet6(0x18, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0x18, 0x3}, 0xc) 19:14:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:01 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) 19:14:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:14:01 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, 0x0) 19:14:02 executing program 5: syz_usb_connect$uac1(0x0, 0xcb, &(0x7f0000001500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xb9, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@mixer_unit={0xb, 0x24, 0x4, 0x4, 0x0, "cfb09db96b16"}, @processing_unit={0x7}, @feature_unit={0xb, 0x24, 0x6, 0x0, 0x0, 0x2, [0x0, 0x0]}, @output_terminal={0x9, 0x24, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3f}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7}, @format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 'w', "16"}, @format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, "7fa2"}, @format_type_i_continuous={0x9, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 'z'}, @format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x0, 0x4}]}, {{0x9, 0x5, 0x1, 0x9, 0x200, 0xfc, 0x0, 0x0, {0x7, 0x25, 0x1, 0x0, 0x0, 0x5}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8}]}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x5, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 19:14:02 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x5452, &(0x7f0000000300)=""/216) [ 583.563402][T14880] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 583.578866][T14879] loop4: detected capacity change from 0 to 178 19:14:02 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) [ 583.624398][T14880] bond39 (uninitialized): Released all slaves 19:14:02 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:02 executing program 2: mlock(&(0x7f0000800000/0x800000)=nil, 0x800000) msync(&(0x7f0000994000/0x4000)=nil, 0x4000, 0x6) 19:14:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:14:02 executing program 0: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000880)={0x14, r0, 0x1}, 0x14}}, 0x0) [ 584.153217][ T8320] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 584.331793][T14901] loop4: detected capacity change from 0 to 178 19:14:03 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) [ 584.403440][ T8320] usb 6-1: Using ep0 maxpacket: 16 [ 584.524857][ T8320] usb 6-1: config 1 has an invalid interface number: 4 but max is 2 [ 584.533428][ T8320] usb 6-1: config 1 has no interface number 1 [ 584.539756][ T8320] usb 6-1: too many endpoints for config 1 interface 4 altsetting 0: 207, using maximum allowed: 30 [ 584.550994][ T8320] usb 6-1: config 1 interface 4 altsetting 0 endpoint 0x1 has an invalid bInterval 252, changing to 7 [ 584.562399][ T8320] usb 6-1: config 1 interface 4 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 207 [ 584.576229][ T8320] usb 6-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 19:14:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:03 executing program 2: r0 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$6lowpan_enable(r0, &(0x7f0000000040)='1', 0x1) [ 584.705445][T14911] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 584.751915][T14911] bond39 (uninitialized): Released all slaves 19:14:03 executing program 0: syz_open_dev$evdev(&(0x7f0000000280), 0xffffffffffffffff, 0x0) 19:14:03 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 585.134872][ T8320] usb 6-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 585.144833][ T8320] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 585.153410][ T8320] usb 6-1: Product: syz [ 585.157699][ T8320] usb 6-1: Manufacturer: syz [ 585.162522][ T8320] usb 6-1: SerialNumber: syz [ 585.223369][T14923] loop4: detected capacity change from 0 to 178 [ 585.808021][ T8320] usb 6-1: USB disconnect, device number 3 19:14:04 executing program 5: syz_open_dev$hiddev(&(0x7f0000000540), 0x0, 0x210020) 19:14:04 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) 19:14:04 executing program 2: syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x20180) 19:14:04 executing program 0: syz_usb_connect$uac1(0x0, 0x80, &(0x7f0000001500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6e, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@mixer_unit={0x5}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 'w', "16"}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7, 0x25, 0x1, 0x0, 0x0, 0x3ff}}}}}}}]}}, 0x0) 19:14:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000006d200)) 19:14:04 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:14:05 executing program 2: syz_usb_connect$uac1(0x0, 0xdd, &(0x7f0000000300)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xcb, 0x3, 0x1, 0x0, 0x0, 0x4, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@feature_unit={0x11, 0x24, 0x6, 0x0, 0x0, 0x5, [0x0, 0x0, 0x4, 0x0, 0x0], 0x9}, @selector_unit={0xa, 0x24, 0x5, 0x6, 0x0, "743f1fec97"}, @processing_unit={0xb, 0x24, 0x7, 0x0, 0x0, 0x83, "1d87a787"}, @mixer_unit={0x5}, @input_terminal={0xc}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x4, {0x7, 0x25, 0x1, 0x3}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xa, 0x24, 0x2, 0x2, 0x0, 0x0, 0x5, "c1"}, @as_header={0x7}, @format_type_i_discrete={0xc, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x7, "9275dfd1"}, @format_type_i_discrete={0xe, 0x24, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, "23c096ca1392"}, @format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x5, 0x0, 0x8, 0x0, "95c8"}]}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7, 0x25, 0x1, 0x2, 0x9}}}}}}}]}}, 0x0) [ 586.763940][ T8320] usb 1-1: new high-speed USB device number 4 using dummy_hcd 19:14:05 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) 19:14:05 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000006d200)) 19:14:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 587.013854][ T8320] usb 1-1: Using ep0 maxpacket: 16 19:14:05 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000001240)={{0x12, 0x1, 0x0, 0xae, 0xb3, 0x4b, 0x8, 0x12d1, 0x2706, 0x207d, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xff, 0x2, 0x73, 0x0, [], [{{0x9, 0x5, 0x3}}]}}]}}]}}, 0x0) [ 587.135556][ T8320] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 587.146841][ T8320] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 587.156101][ T8320] usb 1-1: Duplicate descriptor for config 1 interface 0 altsetting 0, skipping [ 587.425062][ T8320] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 587.434466][ T8320] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 587.443229][ T8320] usb 1-1: Product: syz [ 587.447530][ T8320] usb 1-1: Manufacturer: syz [ 587.452255][ T8320] usb 1-1: SerialNumber: syz 19:14:06 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) [ 587.634625][ T19] usb 3-1: new high-speed USB device number 6 using dummy_hcd 19:14:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000006d200)) [ 587.873728][ T19] usb 3-1: Using ep0 maxpacket: 8 [ 588.006235][ T19] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 588.016975][ T19] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 588.026497][ T19] usb 3-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x24, skipping [ 588.037324][ T19] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 588.113592][ T8320] usb 1-1: 0:2 : does not exist [ 588.134390][ T8339] usb 6-1: new high-speed USB device number 4 using dummy_hcd 19:14:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 588.224142][ T8320] usb 1-1: USB disconnect, device number 4 [ 588.385994][ T8339] usb 6-1: Using ep0 maxpacket: 8 19:14:07 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}], 0x0, &(0x7f000006d200)) [ 588.508402][ T8339] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 588.525446][ T19] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 588.534973][ T19] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 588.543417][ T19] usb 3-1: Product: syz [ 588.547709][ T19] usb 3-1: Manufacturer: syz [ 588.552437][ T19] usb 3-1: SerialNumber: syz 19:14:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) fchownat(0xffffffffffffffff, 0x0, 0x0, 0xee01, 0x0) 19:14:07 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/loop0', 0x210000, 0x0) waitid$P_PIDFD(0x3, r0, 0x0, 0x4, 0x0) [ 588.694898][ T8339] usb 6-1: New USB device found, idVendor=12d1, idProduct=2706, bcdDevice=20.7d [ 588.704611][ T8339] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 588.712765][ T8339] usb 6-1: Product: syz [ 588.717343][ T8339] usb 6-1: Manufacturer: syz [ 588.722076][ T8339] usb 6-1: SerialNumber: syz [ 588.900747][ T8339] usb 6-1: config 0 descriptor?? [ 588.950340][ T8339] option 6-1:0.0: GSM modem (1-port) converter detected [ 589.043839][ T19] usb 3-1: 0:2 : does not exist [ 589.064518][T15036] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 589.167393][T15036] bond39 (uninitialized): Released all slaves [ 589.178329][ T2827] usb 6-1: USB disconnect, device number 4 [ 589.188019][ T2827] option 6-1:0.0: device disconnected [ 589.243481][ T19] usb 3-1: USB disconnect, device number 6 19:14:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/fib_trie\x00') fcntl$setstatus(r0, 0x4, 0x2400) [ 589.600788][ T24] audit: type=1326 audit(1639422848.290:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15045 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf6ed8549 code=0xffff0000 19:14:08 executing program 2: request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='fscrypt-provisioning\x00', 0x0) 19:14:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 589.696774][T15067] loop4: detected capacity change from 0 to 178 19:14:08 executing program 0: sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, 0x0, 0x150) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(0x0, 0xffffffffffffffff) 19:14:08 executing program 5: syz_usb_connect(0x0, 0x24, &(0x7f0000001240)={{0x12, 0x1, 0x0, 0xae, 0xb3, 0x4b, 0x8, 0x12d1, 0x2706, 0x207d, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x2, 0x73, 0x80}}]}}]}}, 0x0) [ 589.797831][T15067] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 589.797831][T15067] [ 589.890685][T15067] ERROR: (device loop4): remounting filesystem as read-only [ 589.898479][T15067] xtLookup: xtSearch returned -5 [ 589.903855][T15067] read_mapping_page failed! [ 589.908483][T15067] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 590.048139][T15067] Mount JFS Failure: -5 [ 590.052568][T15067] jfs_mount failed w/return code = -5 19:14:08 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000080), &(0x7f0000000100)=0x18) 19:14:09 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}], 0x0, &(0x7f000006d200)) 19:14:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000040), &(0x7f0000000080)=0x8) [ 590.518691][T15085] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:14:09 executing program 0: socket$inet6(0x1c, 0x3, 0x9) [ 590.616150][T15085] bond39 (uninitialized): Released all slaves [ 590.724089][ T19] usb 6-1: new high-speed USB device number 5 using dummy_hcd 19:14:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:09 executing program 3: open(0x0, 0x40083, 0x0) [ 590.973970][ T19] usb 6-1: Using ep0 maxpacket: 8 [ 591.060712][T15100] loop4: detected capacity change from 0 to 178 [ 591.171505][T15100] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 591.171505][T15100] [ 591.265761][ T19] usb 6-1: New USB device found, idVendor=12d1, idProduct=2706, bcdDevice=20.7d [ 591.273319][T15100] ERROR: (device loop4): remounting filesystem as read-only [ 591.275157][ T19] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 591.282548][T15100] xtLookup: xtSearch returned -5 [ 591.282595][T15100] read_mapping_page failed! [ 591.290935][ T19] usb 6-1: Product: syz [ 591.296066][T15100] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 591.312664][ T19] usb 6-1: Manufacturer: syz [ 591.317664][ T19] usb 6-1: SerialNumber: syz 19:14:10 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x10) 19:14:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000080)={r4}, &(0x7f0000000100)=0x18) [ 591.511499][T15100] Mount JFS Failure: -5 [ 591.516464][T15100] jfs_mount failed w/return code = -5 [ 591.551286][ T19] usb 6-1: config 0 descriptor?? [ 591.571668][T15110] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 591.615449][T15110] bond39 (uninitialized): Released all slaves [ 591.828298][ T19] option 6-1:0.0: GSM modem (1-port) converter detected 19:14:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}], 0x0, &(0x7f000006d200)) 19:14:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000140), &(0x7f0000000200)=0x88) [ 591.938624][ T19] usb 6-1: USB disconnect, device number 5 [ 591.947491][ T19] option 6-1:0.0: device disconnected 19:14:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:11 executing program 5: pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x8, r0) 19:14:11 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000002680), &(0x7f00000026c0)=0x8) 19:14:11 executing program 0: ppoll(0x0, 0xdbf0, &(0x7f0000000040), 0x0, 0x0) [ 592.466539][T15140] loop4: detected capacity change from 0 to 178 [ 592.573184][T15140] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 592.573184][T15140] [ 592.709861][T15140] ERROR: (device loop4): remounting filesystem as read-only [ 592.717646][T15140] xtLookup: xtSearch returned -5 [ 592.722677][T15140] read_mapping_page failed! [ 592.728068][T15140] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:14:11 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendto$inet(r2, 0x0, 0x0, 0x80, &(0x7f0000001040)={0x10, 0x2}, 0x10) [ 592.917150][T15140] Mount JFS Failure: -5 [ 592.921923][T15140] jfs_mount failed w/return code = -5 [ 592.951944][T15149] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:14:11 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f00000001c0)={0x0, @in, 0x0, 0x0, 0x80, 0x0, 0x2}, 0x98) [ 593.049192][T15149] bond39 (uninitialized): Released all slaves 19:14:11 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) dup2(r1, r0) 19:14:12 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {0x0, 0x0, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:12 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000001640)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="100000008400000001000004000000000004"], 0x50}, 0x0) 19:14:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:12 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, @in, 0x0, 0x200, 0x12}, 0x98) 19:14:12 executing program 3: fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 593.943723][T15179] loop4: detected capacity change from 0 to 178 [ 594.071197][T15179] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 594.071197][T15179] [ 594.101508][T15185] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 594.157120][T15185] bond39 (uninitialized): Released all slaves [ 594.166552][T15179] ERROR: (device loop4): remounting filesystem as read-only [ 594.174502][T15179] xtLookup: xtSearch returned -5 [ 594.179979][T15179] read_mapping_page failed! [ 594.184790][T15179] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:14:12 executing program 0: ppoll(0x0, 0xf0db, &(0x7f0000000040), 0x0, 0x0) [ 594.339243][T15179] Mount JFS Failure: -5 [ 594.345578][T15179] jfs_mount failed w/return code = -5 19:14:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000180), &(0x7f0000000040)=0x98) 19:14:13 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {0x0, 0x0, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:13 executing program 2: ppoll(0x0, 0x4, &(0x7f0000000040), 0x0, 0x0) 19:14:13 executing program 3: readv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f0000001440)=""/207, 0xcf}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000000)=""/94, 0x5e}, {&(0x7f0000001200)=""/79, 0x4f}, {&(0x7f0000000180)=""/32, 0x20}, {&(0x7f0000000100)=""/120, 0x78}, {&(0x7f0000001340)=""/121, 0xfffffffffffffdbc}], 0x7) 19:14:13 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000080)={r4}, &(0x7f0000000100)=0x18) 19:14:14 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ppoll(&(0x7f0000000000)=[{r0, 0xfbba5071506be5d7}], 0x1, 0x0, 0x0, 0x0) [ 595.404216][T15211] loop4: detected capacity change from 0 to 178 19:14:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002540)={&(0x7f00000002c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@sndrcv={0x2c}, @sndrcv={0x2c}], 0x58}, 0x0) [ 595.487483][T15217] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 595.525764][T15217] bond39 (uninitialized): Released all slaves [ 595.568894][T15211] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 595.568894][T15211] 19:14:14 executing program 3: socket(0x1, 0x3, 0x3) [ 595.671562][T15211] ERROR: (device loop4): remounting filesystem as read-only [ 595.680038][T15211] xtLookup: xtSearch returned -5 [ 595.685410][T15211] read_mapping_page failed! [ 595.690042][T15211] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 595.850893][T15211] Mount JFS Failure: -5 [ 595.859279][T15211] jfs_mount failed w/return code = -5 19:14:14 executing program 0: pipe2(&(0x7f0000000880)={0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x4}, 0x0, 0x0) 19:14:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:14 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {0x0, 0x0, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) pipe2(&(0x7f0000000880)={0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000180)=[{r0, 0x2000}, {r1, 0x4}], 0x2, 0x0, 0x0, 0x0) 19:14:15 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$lock(r0, 0xd, &(0x7f0000000000)) [ 596.926489][T15243] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:14:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfff}, 0x8) [ 597.208306][T15285] loop4: detected capacity change from 0 to 178 19:14:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) ppoll(&(0x7f0000000080)=[{r0, 0x40}, {r1, 0x2}], 0x2, 0x0, 0x0, 0x0) [ 597.328470][T15285] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 597.328470][T15285] [ 597.423734][T15285] ERROR: (device loop4): remounting filesystem as read-only [ 597.431307][T15285] xtLookup: xtSearch returned -5 [ 597.436840][T15285] read_mapping_page failed! [ 597.441743][T15285] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:14:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 597.668780][T15285] Mount JFS Failure: -5 [ 597.673458][T15285] jfs_mount failed w/return code = -5 19:14:16 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000), 0x0, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f00000001c0)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x98) 19:14:16 executing program 2: socketpair(0x1, 0x5, 0x1, &(0x7f0000000080)) [ 598.225006][T15299] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:14:17 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) writev(r0, &(0x7f00000013c0), 0x10000000000000cb) 19:14:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000000), 0xb) 19:14:17 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000100)='\t', 0x1) [ 599.008147][T15349] loop4: detected capacity change from 0 to 178 [ 599.147354][T15349] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 599.147354][T15349] [ 599.252378][T15349] ERROR: (device loop4): remounting filesystem as read-only [ 599.260078][T15349] xtLookup: xtSearch returned -5 [ 599.265454][T15349] read_mapping_page failed! [ 599.270073][T15349] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:14:18 executing program 3: r0 = semget(0x3, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x6, &(0x7f0000000040)={{0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}}) 19:14:18 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = getpgrp(0x0) fcntl$setown(r0, 0x6, r1) fcntl$setown(r0, 0x6, 0x0) [ 599.399261][T15355] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 599.463254][T15349] Mount JFS Failure: -5 [ 599.467725][T15349] jfs_mount failed w/return code = -5 19:14:18 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000), 0x0, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:18 executing program 2: r0 = semget(0x3, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x7, 0x0) 19:14:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000100), 0x7) 19:14:19 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="6aee888af73f5fa57369c34e5e2236b431cc9aeabd64e28aef13584301946b2303531e656b8943b295fda1a7c5cb1ba449d6bf13bd281c6aef68d8317a6d7bd021793674b2818ceb52926216ee875bab68ec342671faedd722d02fa8ee61aaeb8fb63c1cd09d292dcceef615", 0x6c}], 0x1) [ 600.435739][T15412] loop4: detected capacity change from 0 to 178 19:14:19 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x1}, 0xc) [ 600.524338][T15412] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 600.524338][T15412] [ 600.595781][T15412] ERROR: (device loop4): remounting filesystem as read-only [ 600.603916][T15412] xtLookup: xtSearch returned -5 [ 600.608960][T15412] read_mapping_page failed! [ 600.613954][T15412] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 600.703554][T15412] Mount JFS Failure: -5 [ 600.708025][T15412] jfs_mount failed w/return code = -5 [ 600.748540][T15419] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:14:19 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000), 0x0, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) recvfrom$inet(r0, &(0x7f0000000000)=""/103, 0x67, 0x0, 0x0, 0x0) 19:14:20 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 19:14:20 executing program 5: pipe(&(0x7f0000000000)) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) 19:14:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:20 executing program 0: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x1, 0x0) [ 601.814492][T15478] loop4: detected capacity change from 0 to 178 [ 601.886888][T15478] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 601.886888][T15478] [ 601.987790][T15478] ERROR: (device loop4): remounting filesystem as read-only [ 601.995630][T15478] xtLookup: xtSearch returned -5 [ 602.004781][T15478] read_mapping_page failed! [ 602.010278][T15478] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:14:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000200)={'TPROXY\x00'}, &(0x7f0000000240)=0x1e) [ 602.138387][T15478] Mount JFS Failure: -5 [ 602.143586][T15478] jfs_mount failed w/return code = -5 [ 602.200786][T15489] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:14:21 executing program 5: r0 = fanotify_init(0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 19:14:21 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)='\x00'/11, 0xb, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0xfffffffffffffffc, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0xeffd}]) 19:14:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:21 executing program 0: prctl$PR_SET_MM(0x23, 0xc, &(0x7f0000ffc000/0x1000)=nil) 19:14:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x0, 0x0, &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 603.178511][T15542] loop4: detected capacity change from 0 to 178 19:14:22 executing program 5: fsopen(&(0x7f0000000000)='proc\x00', 0x0) [ 603.290002][T15542] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 603.290002][T15542] [ 603.402469][T15542] ERROR: (device loop4): remounting filesystem as read-only [ 603.410299][T15542] xtLookup: xtSearch returned -5 [ 603.415881][T15542] read_mapping_page failed! [ 603.420516][T15542] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:14:22 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') [ 603.559993][T15550] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 603.597234][T15542] Mount JFS Failure: -5 [ 603.601664][T15542] jfs_mount failed w/return code = -5 19:14:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) 19:14:22 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f00000020c0)) 19:14:22 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)='\x00'/11, 0xb, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:22 executing program 5: mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x5) 19:14:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:23 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs, 0x2000006e) 19:14:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) [ 604.688833][T15606] loop4: detected capacity change from 0 to 178 [ 604.826700][T15606] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 604.826700][T15606] 19:14:23 executing program 2: mknodat$loop(0xffffffffffffffff, 0x0, 0xe020, 0x1) [ 604.936860][T15606] ERROR: (device loop4): remounting filesystem as read-only [ 604.944169][T15612] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 604.944790][T15606] xtLookup: xtSearch returned -5 [ 604.957713][T15606] read_mapping_page failed! [ 604.962343][T15606] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:14:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x2000, &(0x7f0000000340)) [ 605.063867][T15606] Mount JFS Failure: -5 [ 605.068263][T15606] jfs_mount failed w/return code = -5 19:14:23 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)='\x00'/11, 0xb, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:24 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 19:14:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) 19:14:24 executing program 2: sendmsg$NL80211_CMD_AUTHENTICATE(0xffffffffffffffff, 0x0, 0xc3ce7b47995b304d) [ 606.013886][T15668] loop4: detected capacity change from 0 to 178 19:14:24 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) [ 606.140992][T15668] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 606.140992][T15668] [ 606.241845][T15668] ERROR: (device loop4): remounting filesystem as read-only [ 606.249693][T15668] xtLookup: xtSearch returned -5 [ 606.255071][T15668] read_mapping_page failed! [ 606.259693][T15668] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 606.333393][T15675] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 606.512190][T15668] Mount JFS Failure: -5 [ 606.517172][T15668] jfs_mount failed w/return code = -5 19:14:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x84) 19:14:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) 19:14:25 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='uid_map\x00') 19:14:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:25 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)='\x00'/16, 0x10, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000280)={'syztnl0\x00', 0x0}) 19:14:26 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001140)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 19:14:26 executing program 0: preadv(0xffffffffffffffff, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) 19:14:26 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x401070c9, 0x0) [ 607.693276][T15733] loop4: detected capacity change from 0 to 178 [ 607.705557][T15731] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 607.891187][T15733] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 607.891187][T15733] [ 608.009973][T15733] ERROR: (device loop4): remounting filesystem as read-only [ 608.017928][T15733] xtLookup: xtSearch returned -5 [ 608.023325][T15733] read_mapping_page failed! [ 608.027950][T15733] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 608.218272][T15733] Mount JFS Failure: -5 [ 608.222742][T15733] jfs_mount failed w/return code = -5 19:14:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:27 executing program 0: preadv(0xffffffffffffffff, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) 19:14:27 executing program 3: getrusage(0x0, &(0x7f0000000540)) 19:14:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)='\x00'/16, 0x10, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 19:14:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) [ 609.034276][T15791] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 609.111659][T15791] bond48 (uninitialized): Released all slaves 19:14:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:14:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) [ 609.355586][T15804] loop4: detected capacity change from 0 to 178 [ 609.500943][T15804] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 609.500943][T15804] [ 609.587981][T15804] ERROR: (device loop4): remounting filesystem as read-only [ 609.595867][T15804] xtLookup: xtSearch returned -5 [ 609.600912][T15804] read_mapping_page failed! [ 609.605957][T15804] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:14:28 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 19:14:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 609.710834][T15804] Mount JFS Failure: -5 [ 609.715660][T15804] jfs_mount failed w/return code = -5 19:14:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) 19:14:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)='\x00'/16, 0x10, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:28 executing program 3: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:14:28 executing program 0: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) [ 610.272703][T15821] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 610.337801][T15821] bond48 (uninitialized): Released all slaves 19:14:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') write$FUSE_ATTR(r0, 0x0, 0x0) [ 610.584851][T15837] loop4: detected capacity change from 0 to 178 [ 610.651760][T15837] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 610.651760][T15837] 19:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) [ 610.738102][T15837] ERROR: (device loop4): remounting filesystem as read-only [ 610.746172][T15837] xtLookup: xtSearch returned -5 [ 610.751391][T15837] read_mapping_page failed! [ 610.756540][T15837] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:14:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:14:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/vlan/vlan1\x00') write$FUSE_GETXATTR(r0, 0x0, 0x0) [ 610.872587][T15837] Mount JFS Failure: -5 [ 610.877591][T15837] jfs_mount failed w/return code = -5 19:14:29 executing program 0: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) 19:14:29 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0xfffffffffffffff5, r1}, 0x28) 19:14:29 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003", 0x13, 0xb2e0}], 0x0, &(0x7f000006d200)) [ 611.351411][T15853] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 611.437577][T15853] bond48 (uninitialized): Released all slaves 19:14:30 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000280)={0x1, 0x41, "6034216c7518a652e08ad09ee64fa93c3219212c0af945fffd29dd6237023fc45518b38b9bf55ccb000190496556166650ce89d57d1d2260b525ca36dba31aa4c1"}) 19:14:30 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f00000020c0)='/sys/module/sr_mod', 0x234080, 0x0) 19:14:30 executing program 0: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) 19:14:30 executing program 5: r0 = io_uring_setup(0x39ee, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x1efe, 0x8, 0x3, 0x0, 0x0, r0}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, &(0x7f00000000c0)) r1 = syz_io_uring_setup(0x1239, &(0x7f0000000100)={0x0, 0xd4d5, 0x8, 0x1, 0x5a}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000200)=@IORING_OP_WRITE_FIXED={0x5, 0x4, 0x2000, @fd_index=0x3, 0x0, 0xff, 0x0, 0x8, 0x1}, 0x100) r3 = io_uring_setup(0x2bae, &(0x7f0000000340)={0x0, 0x9242, 0x0, 0x2, 0x136, 0x0, r1}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff3000/0x1000)=nil, 0x1000, 0x0, 0x12, r3, 0x0) r4 = syz_io_uring_setup(0x7482, &(0x7f0000001100)={0x0, 0x7330, 0x1, 0x1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000001180), &(0x7f00000011c0)) syz_io_uring_setup(0x2941, &(0x7f0000004040)={0x0, 0xf297, 0x2, 0x2, 0x1cb, 0x0, r4}, &(0x7f0000fed000/0x12000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000040c0), &(0x7f0000004100)) 19:14:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 611.929419][T15871] loop4: detected capacity change from 0 to 178 [ 612.061976][T15871] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 612.061976][T15871] [ 612.127623][T15871] ERROR: (device loop4): remounting filesystem as read-only [ 612.135421][T15871] xtLookup: xtSearch returned -5 [ 612.144198][T15871] read_mapping_page failed! [ 612.148914][T15871] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:14:30 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000), 0xffffffffffffffff, 0x264000) [ 612.381918][T15871] Mount JFS Failure: -5 [ 612.386659][T15871] jfs_mount failed w/return code = -5 19:14:31 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) [ 612.689679][T15887] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 612.772018][T15887] bond48 (uninitialized): Released all slaves 19:14:31 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003", 0x13, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:14:31 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) 19:14:31 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000040)=0x2000, 0x4) 19:14:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:14:32 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) [ 613.554864][T15904] loop4: detected capacity change from 0 to 178 [ 613.617761][T15904] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 613.617761][T15904] [ 613.665279][T15904] ERROR: (device loop4): remounting filesystem as read-only [ 613.677849][T15904] xtLookup: xtSearch returned -5 [ 613.684005][T15904] read_mapping_page failed! [ 613.688642][T15904] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 613.799104][T15904] Mount JFS Failure: -5 [ 613.803928][T15904] jfs_mount failed w/return code = -5 [ 613.988730][T15915] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 614.077879][T15915] bond48 (uninitialized): Released all slaves [ 637.870575][ T1199] ieee802154 phy0 wpan0: encryption failed: -22 [ 637.877334][ T1199] ieee802154 phy1 wpan1: encryption failed: -22 19:15:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x191905, &(0x7f00000003c0)=ANY=[]) 19:15:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 19:15:03 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c00, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a8170f651a299f6c2c51223e73b03ca80016825d803f81620a6f55c659c4cdf9e3f7cc6db073f4ca2718d82200bd3e85ffd20fd2c2dac0d07419ff5f725af4fb", "499b9a2ad851aa35f3fed6e75eb472b48e08039668e6ba6a0b620ef0c81db642ffb16911efff75bbc9222ffad2e5c71dff77071bf161cad7dccebc7bfbf55f4a", "ad01e90d7c7fa452df9b18af673d9f6712ae570265ba67f46f76e5c973f71004"}) 19:15:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003", 0x13, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:03 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x7, 0x0) 19:15:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 644.796551][T15954] loop4: detected capacity change from 0 to 178 [ 644.840331][T15960] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 644.869366][T15960] bond48 (uninitialized): Released all slaves 19:15:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x7, 0x0, 0x0) 19:15:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={0x0, 0x9b05000000000000}}, 0x0) [ 645.031118][T15954] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 645.031118][T15954] 19:15:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, 0x0, 0x0, 0x7, 0x0) [ 645.152237][T15954] ERROR: (device loop4): remounting filesystem as read-only [ 645.160102][T15954] xtLookup: xtSearch returned -5 [ 645.165748][T15954] read_mapping_page failed! [ 645.170378][T15954] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 645.330981][T15954] Mount JFS Failure: -5 [ 645.335653][T15954] jfs_mount failed w/return code = -5 19:15:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:04 executing program 3: semctl$GETPID(0x0, 0x0, 0x14, 0x0) 19:15:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="0000000000000000000000000000000083000300", 0x14, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:04 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000001080)=[{&(0x7f0000000f40)="ea", 0x1}, {0x0, 0x0, 0x400}, {&(0x7f0000001000)='}', 0x1}], 0x0, &(0x7f00000011c0)) 19:15:04 executing program 5: openat$incfs(0xffffffffffffffff, &(0x7f0000000900)='.log\x00', 0x0, 0x0) 19:15:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, 0x0, 0x0, 0x7, 0x0) [ 645.967693][T15987] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 646.052897][T15987] bond48 (uninitialized): Released all slaves 19:15:04 executing program 3: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) [ 646.184117][T15993] loop2: detected capacity change from 0 to 4 [ 646.232290][T16000] loop4: detected capacity change from 0 to 178 [ 646.358452][T16000] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 646.358452][T16000] 19:15:05 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x6000) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) [ 646.454372][T16000] ERROR: (device loop4): remounting filesystem as read-only [ 646.462016][T16000] xtLookup: xtSearch returned -5 [ 646.467567][T16000] read_mapping_page failed! [ 646.472297][T16000] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:15:05 executing program 5: syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 19:15:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, 0x0, 0x0, 0x7, 0x0) [ 646.630891][T16000] Mount JFS Failure: -5 [ 646.635756][T16000] jfs_mount failed w/return code = -5 19:15:05 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="0000000000000000000000000000000083000300", 0x14, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:05 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x80400, 0x0) 19:15:05 executing program 2: shmget(0x2, 0x3000, 0x0, &(0x7f0000ff8000/0x3000)=nil) 19:15:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000cc0), 0xffffffffffffffff) 19:15:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x0, 0x7, 0x0) [ 647.175170][T16025] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 647.207198][T16025] bond48 (uninitialized): Released all slaves [ 647.377553][T16034] loop4: detected capacity change from 0 to 178 [ 647.441691][T16034] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 647.441691][T16034] [ 647.520008][T16034] ERROR: (device loop4): remounting filesystem as read-only [ 647.527793][T16034] xtLookup: xtSearch returned -5 [ 647.532841][T16034] read_mapping_page failed! [ 647.537851][T16034] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:15:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:06 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000003c0), r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) [ 647.735579][T16034] Mount JFS Failure: -5 [ 647.740003][T16034] jfs_mount failed w/return code = -5 19:15:06 executing program 2: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) r0 = shmget(0x1, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) 19:15:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000440), &(0x7f0000000480)=0x4) 19:15:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="0000000000000000000000000000000083000300", 0x14, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x0, 0x7, 0x0) [ 648.188506][T16052] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 648.242418][T16052] bond48 (uninitialized): Released all slaves 19:15:07 executing program 3: r0 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4074) shmdt(r0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0xb000) [ 648.613712][T16069] loop4: detected capacity change from 0 to 178 19:15:07 executing program 2: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 648.663645][T16069] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 648.663645][T16069] 19:15:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f0000000100)) 19:15:07 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 648.767848][T16069] ERROR: (device loop4): remounting filesystem as read-only [ 648.776087][T16069] xtLookup: xtSearch returned -5 [ 648.781121][T16069] read_mapping_page failed! [ 648.786106][T16069] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:15:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x0, 0x7, 0x0) [ 648.924066][T16069] Mount JFS Failure: -5 [ 648.928360][T16069] jfs_mount failed w/return code = -5 19:15:07 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15}], 0x0, &(0x7f000006d200)) 19:15:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) 19:15:08 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x22000, 0x0) 19:15:08 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000b80), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000cc0), 0xffffffffffffffff) 19:15:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0)=[{0x0}], 0x1, 0x7, 0x0) [ 649.789536][T16099] loop4: detected capacity change from 0 to 178 19:15:08 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 649.982313][T16099] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 649.982313][T16099] 19:15:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2140, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0xc03, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x10) getresuid(0x0, &(0x7f0000001140), &(0x7f0000001180)=0x0) syz_mount_image$vfat(&(0x7f0000000840), &(0x7f0000000f00)='./file0\x00', 0x0, 0x3, &(0x7f0000001080)=[{&(0x7f0000000f40)="eaf82f70d89d8b8b3ddb062b66c24d200499486e2fbe8bb2e78b91b06e74479266e3fb9d5c4b5e35eaa0159196b3f8f85d37e5260302a1b20d1efb99d4f15caffb3caf43cd461181cad8", 0x4a, 0x27}, {&(0x7f0000000fc0), 0x0, 0x400}, {&(0x7f0000001000)="7d77c94c3d607d5e5f035ad22265ad8cb4a329ca1f11d53645750bd6335c371866176227a738abbfb63bb3ecaf56299784b7e7c7968fa94ee6419577eeb39f2ea7517131ddf1b6e1909579d12dd99f58d0b29598e1cf5f4ccc401403650d855a898208578fd0a73944a4167c7250", 0x6e, 0x4}], 0xa020, &(0x7f00000011c0)={[{@shortname_winnt}, {@rodir}, {@shortname_mixed}, {@fat=@check_normal}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@euid_eq={'euid', 0x3d, r1}}, {@pcr={'pcr', 0x3d, 0x16}}, {@subj_role={'subj_role', 0x3d, '('}}, {@dont_appraise}, {@func={'func', 0x3d, 'MODULE_CHECK'}}]}) [ 650.071199][T16099] ERROR: (device loop4): remounting filesystem as read-only [ 650.079036][T16099] xtLookup: xtSearch returned -5 [ 650.084677][T16099] read_mapping_page failed! [ 650.089305][T16099] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:15:08 executing program 3: shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4074) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) [ 650.242665][T16099] Mount JFS Failure: -5 [ 650.247527][T16099] jfs_mount failed w/return code = -5 19:15:09 executing program 5: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x54db2dcef073616f, 0xffffffffffffffff) 19:15:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0)=[{0x0}], 0x1, 0x7, 0x0) 19:15:09 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15}], 0x0, &(0x7f000006d200)) 19:15:09 executing program 3: statx(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) [ 650.731593][T16119] loop2: detected capacity change from 0 to 4 19:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001400)=[{0x0}, {0x0}], 0x2}, 0x8102) 19:15:09 executing program 5: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000009000)) 19:15:09 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r1, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 651.205286][T16135] loop4: detected capacity change from 0 to 178 [ 651.269649][T16135] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 651.269649][T16135] [ 651.320760][T16135] ERROR: (device loop4): remounting filesystem as read-only [ 651.328688][T16135] xtLookup: xtSearch returned -5 [ 651.334406][T16135] read_mapping_page failed! [ 651.339024][T16135] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:15:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0)=[{0x0}], 0x1, 0x7, 0x0) 19:15:10 executing program 3: setrlimit(0x5, &(0x7f0000000180)) [ 651.493361][T16135] Mount JFS Failure: -5 [ 651.497739][T16135] jfs_mount failed w/return code = -5 19:15:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15}], 0x0, &(0x7f000006d200)) 19:15:10 executing program 5: r0 = shmat(0x0, &(0x7f0000ffb000/0x3000)=nil, 0x4000) shmdt(r0) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) 19:15:10 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3b, 0x2ada}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000001c0)={0x8000, 0x0, 0x0, 0x1, 0x40, "522035de5fdc1c30dd8c1fb8754ef7c044d5c8", 0xffffffff, 0x6}) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f00000000c0)={0x0, 0x8}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz0', "efa9ceb1296229287bc664386586d4ae6d32060a4314fc5ccadb1674a87a79f3614170434459769ff5f27202c5d07a8f39f1eb65cd972a39266d7c266d569c18a54ef6438848ba4d2252b42ee9cb4885da1deb531899d10b4afdb590c3eec4bac5ea02046686376cbec72f70e9a8fc972e2078fd1f947e501c702c5aa6a03bd6c09452fa94e4cc8e4dca477170be1bbdfcccc2532e"}, 0x99) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000180)) 19:15:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x0, 0x0) 19:15:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 652.292321][T16164] loop4: detected capacity change from 0 to 178 [ 652.405772][T16164] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 652.405772][T16164] 19:15:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={0x0, 0xf00}}, 0x0) [ 652.464611][T16164] ERROR: (device loop4): remounting filesystem as read-only [ 652.472268][T16164] xtLookup: xtSearch returned -5 [ 652.477624][T16164] read_mapping_page failed! [ 652.486218][T16164] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:15:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000640)={&(0x7f0000000580), 0xc, &(0x7f0000000600)={0x0}}, 0x0) [ 652.649498][T16164] Mount JFS Failure: -5 [ 652.654269][T16164] jfs_mount failed w/return code = -5 19:15:11 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/snmp\x00') syz_genetlink_get_family_id$ethtool(&(0x7f0000000380), 0xffffffffffffffff) socket$inet(0x2, 0x6, 0x0) 19:15:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x0, 0x0) 19:15:11 executing program 2: clock_gettime(0x0, &(0x7f0000011780)) 19:15:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000840), 0x0, 0x0, 0x0, &(0x7f0000001080), 0x0, &(0x7f00000011c0)) 19:15:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:15:12 executing program 3: sendmsg$IEEE802154_LIST_PHY(0xffffffffffffffff, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x4000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000b80), 0xffffffffffffffff) [ 653.744068][T16195] loop4: detected capacity change from 0 to 178 [ 653.842821][T16195] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 653.850074][T16195] Mount JFS Failure: -5 [ 653.854732][T16195] jfs_mount failed w/return code = -5 19:15:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1, 0x0, 0x0) 19:15:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$inet(r0, 0x0, 0x0, 0x0) 19:15:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={0x0, 0x9b050000}}, 0x0) 19:15:12 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000480)) 19:15:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 654.852630][T16225] loop4: detected capacity change from 0 to 178 19:15:13 executing program 5: getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000004e80)) [ 655.002631][T16225] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 655.009586][T16225] Mount JFS Failure: -5 [ 655.014109][T16225] jfs_mount failed w/return code = -5 19:15:13 executing program 2: rt_tgsigqueueinfo(0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002180)={0x0, 0x0, 0xff}) 19:15:13 executing program 0: io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 19:15:14 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000040)={'syztnl1\x00', 0x0}) 19:15:14 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getpeername(r0, 0x0, 0x0) 19:15:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:15:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000b80), r0) sendmsg$IEEE802154_DISASSOCIATE_REQ(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={0x0}}, 0x0) 19:15:14 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4bfa, &(0x7f0000000180)) [ 656.417211][T16255] loop4: detected capacity change from 0 to 178 [ 656.585495][T16255] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 656.591972][T16255] Mount JFS Failure: -5 [ 656.596588][T16255] jfs_mount failed w/return code = -5 19:15:15 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {0x0, 0x0, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:15 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000f00)='./file0\x00', 0x0, 0x3, &(0x7f0000001080)=[{&(0x7f0000000f40)="ea", 0x1}, {0x0, 0x0, 0x400}, {&(0x7f0000001000)='}', 0x1}], 0x0, &(0x7f00000011c0)) 19:15:15 executing program 3: rt_tgsigqueueinfo(0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002180)) 19:15:15 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x1b81c51c26d0f5e8}) 19:15:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x574, 0x4}, 0xc, &(0x7f00000005c0)={0x0}}, 0x0) [ 657.662163][T16280] loop0: detected capacity change from 0 to 4 [ 657.755292][T16283] loop4: detected capacity change from 0 to 178 19:15:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 657.885086][T16283] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 657.891734][T16283] Mount JFS Failure: -5 [ 657.896284][T16283] jfs_mount failed w/return code = -5 19:15:16 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='ipvlan0\x00') 19:15:16 executing program 3: io_setup(0x6, &(0x7f00000021c0)=0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001e80)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 19:15:16 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {0x0, 0x0, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:17 executing program 2: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, 0x0, 0x2e250653853e245f) 19:15:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x19, 0x0, 0x0, 0x0, 0x40, 0x1}, 0x40) 19:15:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:15:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x4, 0x29, 0x0, 0x0) 19:15:17 executing program 0: r0 = syz_open_procfs(0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) socketpair(0x2b, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xa, 0x5765, 0x400, 0x20, 0x0, 0xffffffffffffffff, 0x1}, 0x40) [ 659.059083][T16313] loop4: detected capacity change from 0 to 178 19:15:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}) [ 659.233870][T16313] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 659.244141][T16313] Mount JFS Failure: -5 [ 659.248424][T16313] jfs_mount failed w/return code = -5 19:15:18 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) r1 = epoll_create1(0x0) fchmod(r1, 0x0) 19:15:18 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {0x0, 0x0, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x2}, [@IFLA_MAP={0x24}]}, 0x44}, 0x1, 0x18cc9}, 0x0) 19:15:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) 19:15:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:15:18 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) write$6lowpan_enable(r0, 0x0, 0x0) 19:15:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) [ 660.248561][T16341] loop4: detected capacity change from 0 to 178 [ 660.415470][T16341] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 660.421964][T16341] Mount JFS Failure: -5 [ 660.426620][T16341] jfs_mount failed w/return code = -5 19:15:19 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x9c4c1, 0x0) 19:15:19 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00), 0x0, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:19 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)) 19:15:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x38) 19:15:20 executing program 2: syz_open_dev$dri(&(0x7f00000001c0), 0x7f, 0x40) 19:15:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 661.522533][T16368] loop4: detected capacity change from 0 to 178 19:15:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x0, 0x0, 0x600}, 0x40) [ 661.644311][T16368] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 661.650881][T16368] Mount JFS Failure: -5 [ 661.655743][T16368] jfs_mount failed w/return code = -5 19:15:20 executing program 0: socket(0x28, 0x0, 0xfffffbfd) 19:15:20 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00), 0x0, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000001280)=@in={0x2, 0x0, @rand_addr=0x640100ff}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000440)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x0, "c6d6"}], 0x18, 0x3e8}, 0xfc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 19:15:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @private0, 0x7}}) 19:15:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func]}}, &(0x7f0000000100)=""/240, 0x26, 0xf0, 0x1}, 0x20) 19:15:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:15:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x2, &(0x7f0000000200)=@raw=[@map_val], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 662.951852][T16398] loop4: detected capacity change from 0 to 178 19:15:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8931, &(0x7f0000000080)={'sit0\x00', 0x0}) 19:15:21 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x4, 0x53, 0x0, 0x0) [ 663.174757][T16398] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 663.181217][T16398] Mount JFS Failure: -5 [ 663.186069][T16398] jfs_mount failed w/return code = -5 19:15:22 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 19:15:22 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00), 0x0, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:22 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:22 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) 19:15:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:22 executing program 5: io_setup(0x4100, &(0x7f0000000280)) [ 664.291069][T16427] loop4: detected capacity change from 0 to 178 19:15:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000740)={'wg0\x00'}) [ 664.471865][T16427] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 664.478856][T16427] Mount JFS Failure: -5 [ 664.483741][T16427] jfs_mount failed w/return code = -5 19:15:23 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:23 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 664.836100][T16440] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:23 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) 19:15:23 executing program 5: sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, 0x0, 0x1) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18}, './file0\x00'}) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, 0x0, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYBLOB="01", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xa, 0x5765, 0x400, 0x20, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 19:15:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:24 executing program 3: syz_open_dev$evdev(&(0x7f00000002c0), 0x3, 0x0) [ 665.656200][T16456] loop4: detected capacity change from 0 to 178 19:15:24 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) 19:15:24 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 665.858449][T16456] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 665.858449][T16456] [ 665.913616][T16456] ERROR: (device loop4): remounting filesystem as read-only [ 665.921244][T16456] xtLookup: xtSearch returned -5 [ 665.926549][T16456] read_mapping_page failed! [ 665.931167][T16456] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 666.034759][T16464] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 666.059343][T16456] Mount JFS Failure: -5 [ 666.063978][T16456] jfs_mount failed w/return code = -5 19:15:24 executing program 3: bpf$MAP_CREATE(0x4, 0x0, 0xc1) 19:15:25 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:25 executing program 5: bpf$MAP_CREATE(0x14, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 19:15:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:25 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) 19:15:25 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SURVEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 19:15:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8911, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 667.091730][T16488] loop4: detected capacity change from 0 to 178 [ 667.199117][T16488] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 667.199117][T16488] [ 667.212822][T16492] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 667.226402][T16488] ERROR: (device loop4): remounting filesystem as read-only [ 667.237527][T16488] xtLookup: xtSearch returned -5 [ 667.242582][T16488] read_mapping_page failed! [ 667.247808][T16488] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 667.346150][T16488] Mount JFS Failure: -5 [ 667.350817][T16488] jfs_mount failed w/return code = -5 19:15:26 executing program 2: ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 19:15:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:26 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000", 0x1b, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:26 executing program 3: bpf$MAP_CREATE(0x4, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 19:15:26 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:26 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) [ 668.269816][T16514] loop4: detected capacity change from 0 to 178 [ 668.333996][T16515] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 668.367237][T16514] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 668.367237][T16514] [ 668.400496][T16514] ERROR: (device loop4): remounting filesystem as read-only [ 668.408478][T16514] xtLookup: xtSearch returned -5 [ 668.413975][T16514] read_mapping_page failed! [ 668.418592][T16514] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:15:27 executing program 2: ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 19:15:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 668.502252][T16514] Mount JFS Failure: -5 [ 668.507062][T16514] jfs_mount failed w/return code = -5 19:15:27 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000000100)='6', 0x1}], 0x1}, 0x0) 19:15:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000700)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 19:15:28 executing program 2: ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 19:15:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 669.458632][T16539] loop4: detected capacity change from 0 to 178 19:15:28 executing program 3: shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) [ 669.597727][T16539] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 669.597727][T16539] [ 669.639423][T16543] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 669.641663][T16539] ERROR: (device loop4): remounting filesystem as read-only [ 669.657126][T16539] xtLookup: xtSearch returned -5 [ 669.662173][T16539] read_mapping_page failed! [ 669.666931][T16539] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 669.730727][T16539] Mount JFS Failure: -5 [ 669.735540][T16539] jfs_mount failed w/return code = -5 19:15:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:28 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 19:15:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, 0x0, &(0x7f0000000040)) 19:15:29 executing program 3: syz_open_procfs(0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @c}, 0x29, 0xfffffffffffffffe) 19:15:29 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00'}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 670.559625][T16563] loop4: detected capacity change from 0 to 178 [ 670.644206][T16563] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 670.644206][T16563] [ 670.732891][T16563] ERROR: (device loop4): remounting filesystem as read-only [ 670.740713][T16563] xtLookup: xtSearch returned -5 [ 670.746292][T16563] read_mapping_page failed! [ 670.750926][T16563] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 670.869881][T16563] Mount JFS Failure: -5 [ 670.874501][T16563] jfs_mount failed w/return code = -5 [ 670.984602][T16574] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:29 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00'}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:29 executing program 5: rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f00000000c0), 0xffffffffffffffff) 19:15:29 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:29 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 19:15:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect(r0, &(0x7f0000000240)=@un=@abs, 0x80) 19:15:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c00010062"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:30 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00'}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40049409, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 672.010221][T16595] loop4: detected capacity change from 0 to 178 19:15:30 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) [ 672.234124][T16595] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 672.234124][T16595] [ 672.261677][T16600] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:31 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x4}) [ 672.344297][T16595] ERROR: (device loop4): remounting filesystem as read-only [ 672.355962][T16595] xtLookup: xtSearch returned -5 [ 672.361647][T16595] read_mapping_page failed! [ 672.366560][T16595] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 672.538340][T16595] Mount JFS Failure: -5 [ 672.542714][T16595] jfs_mount failed w/return code = -5 19:15:31 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000", 0x30, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c00010062"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:31 executing program 5: io_setup(0x1000, &(0x7f0000000280)=0x0) r1 = socket$kcm(0x29, 0x2, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 19:15:31 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:31 executing program 2: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x46282, 0x0) 19:15:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @empty, 0x0, 0x700}}) [ 673.479413][T16626] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 673.520832][T16627] loop4: detected capacity change from 0 to 178 [ 673.827860][T16627] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 673.827860][T16627] [ 673.935050][T16627] ERROR: (device loop4): remounting filesystem as read-only [ 673.942796][T16627] xtLookup: xtSearch returned -5 [ 673.948072][T16627] read_mapping_page failed! [ 673.952703][T16627] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 674.055773][T16627] Mount JFS Failure: -5 [ 674.060336][T16627] jfs_mount failed w/return code = -5 19:15:32 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:15:32 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:32 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) 19:15:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt(r0, 0x1, 0x0, &(0x7f00000000c0)="d9988d61", 0x4) 19:15:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c00010062"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:33 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000", 0x30, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:33 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x400}, 0x0) 19:15:33 executing program 3: ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448ca, &(0x7f0000000040)) 19:15:33 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:33 executing program 5: io_setup(0x1000, &(0x7f0000000280)=0x0) r1 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_submit(r0, 0x1, &(0x7f0000001500)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) [ 675.049972][T16659] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 675.074411][T16660] loop4: detected capacity change from 0 to 178 [ 675.106287][T16660] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 675.106287][T16660] [ 675.198005][T16660] ERROR: (device loop4): remounting filesystem as read-only [ 675.206512][T16660] xtLookup: xtSearch returned -5 [ 675.211718][T16660] read_mapping_page failed! [ 675.219441][T16660] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 675.247040][T16660] Mount JFS Failure: -5 [ 675.251641][T16660] jfs_mount failed w/return code = -5 19:15:34 executing program 2: add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 19:15:34 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000", 0x30, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') 19:15:34 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:34 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='id_legacy\x00', 0x0, &(0x7f0000001640)="e2", 0x1, r1) 19:15:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x13f}}, 0x20) [ 676.004197][T16686] loop4: detected capacity change from 0 to 178 [ 676.077917][T16686] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 676.077917][T16686] [ 676.149633][T16686] ERROR: (device loop4): remounting filesystem as read-only [ 676.157711][T16686] xtLookup: xtSearch returned -5 [ 676.162752][T16686] read_mapping_page failed! [ 676.167797][T16686] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 676.269499][T16686] Mount JFS Failure: -5 [ 676.274277][T16686] jfs_mount failed w/return code = -5 19:15:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:35 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) getsockname(r0, 0x0, 0x0) 19:15:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4020940d, 0x0) [ 676.527484][T16732] 8021q: adding VLAN 0 to HW filter on device bond48 [ 676.542125][T16732] bond0: (slave bond48): Enslaving as an active interface with an up link [ 676.611091][T16736] device bridge83 entered promiscuous mode [ 676.628189][T16736] bond48: (slave vlan39): Enslaving as an active interface with an up link 19:15:35 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100"/51, 0x33, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x2, 0x0) 19:15:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000002240)={&(0x7f0000002a00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000002a80)="c5024125f22d55acb6d60192d6f2363abad9ed0cd917b7f31904c1edc0a021a5017b563f5233de81961fbc990152f77cfe506eb2c9fa403e472c48ba28452d520d82190bd8c58a52c6b6ddac223896b14d05d05f8b8009035d768d046eb00ff1285778e997b2a78779be4f35813fa613bcdf7e608267626841bbb8a51fc40a1d10d7132c004f5f4aed435d0015354d2527dbd9eb9c8152750e013e1f2717f57c70be11ced547fc920cf24078ad2a345ac531d881fdb7f4596fc724396252936ba7f3e41a00857d841d22096c530219d1fd05d045a9b2", 0xd6}, {&(0x7f0000002b80)="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", 0x1000}, {&(0x7f0000003b80)="cd6bb23735683e5fc4401f1830f6a5d3bfecd992e16061c4b1d66623d6f2af3da22e5ec453d75d92196b9aca586429325c0b5d81ab5fbc7c68f7986603f9777dabbbf67ce6bde9fade6cfd77bba2983f62a394226b167ea6c32f3c3a92a650f03614703917", 0x65}, {&(0x7f0000003c00)="7132b017036a062f740aa2cd64777b25abbee9b85d1e65a62c1dc4643b693948c5e133761a4904b467e31bf3c6329e862d70f4b31abba158ea2963a54c8f1df5bd7ad6ceb71632c457089d8590d135beaaebe06db2239eac2cc7a8483b5cdea26a0bff1125b447678a978f7a0e04714e3e6acbe6ff7216f8057d5a18a043dfc025288c4aa081f4261629c368dae006581f868216ca506c02d5f5f46637cc", 0x9e}, {&(0x7f0000002740)="f14880c632425627dfec262aa9ba4503b0c866308300551a7a4118bd316a65aa6237a76e62e5d5ce38922d1675e4a0abc93d16c72b941addd210ebae7f9c6a0010000000000000a806a606887fdd7147eb543d61", 0x54}, {&(0x7f0000003cc0)="ee3fb0ef21539c3837cad585d0dec97ae6deb361c8c32d5f865fabd48e4b3dd3e39288b4b1e26581ff12a06f87e907c197ca49c9b4451fd83c5ec28e330bd0a6107b3d143a7ff4e8e57f4e69ee688702e003074adc11b8c518f3be7f0b9b747c911262d4e498f49e4a169d4dffdbf38ea78caabfebeaf5a9bc5b84c21fb7fd0ebb85de3095abcf9584c96915ca5f9d8a98b343d35dfdd064123f9cdc3586620491ce045f8277972179e1ee3bdd9f8ebab098a11b4051a66e2ba717de8c9d84b8d84d88d45f39d1a373d019e95485cec3374fa4355aa7e6a6b8", 0xd9}, {&(0x7f0000003dc0)="4676beb30734b9ce5f8f33bf060f61e30a4d94816b4193aa286f04f4c524cce6dbfb6445ec07df38d457cbf5ca7e6753171db820150a677fa7d01d19450a3b7fae9c6e992ca8e0b71f04c4dd2b6d1db4afae7c53c42ce018fb920e1aa0d513bb98fdf3c3672ae5c6a9e0d48726a12c2d416a4038e46f3f7d3352b0ea8db83f3a42814ae863a4b5ddb1ffe7aa745695edddd0ee4cd9232bce6eaef058c77d72a8ab8187534a24f4a25851eeef21390740b8", 0xb1}, {&(0x7f0000003e80)="f7b6634a083f777310989077b40275b04c6e9d8dd8303f37109a7a0128a955f8ddab030635d5435fa5a6afc4d4d1d335a2f1d9edf121136a23d5531aa72737fc05484b290cbd7d15290ec1a148101a5815ecc24ed0fcf233a42e474af1ca666a808fdd66b729eb7e8b962227927250948e2436c1248e72ea38e67d803d3109ffe2912cbd926348d14a8dcf902f3d10b8d9c63db178edce09446aa446d15183477718885c591d4c669b125d5e86a3aa", 0xaf}], 0x1191, &(0x7f0000003fc0)=[{0x90, 0x0, 0x0, "c90b933a442e78955e60d1d08ae7b5633d10190cfb31c616067da1de5f6d0a202a24381ba4d2de61d8ddb0d330f06b67edf992b3431f1d93eda9e777292a4de3c83a4b8841ae3635ca9dca21f54cf27c2c1a7531eeabb8108a5384c85ea96b7382814bc1ea2ea03b0423d00438c517c5f755d3d139ab93e0952e4afa"}, {0xe0, 0x0, 0x0, "51a916d86bd7e4113d025ca3d2e4b4a591db12fa72d4e1e4ec50de77f1541cd55c75ab3b50c12bdf06440a0f4a8dfe58452bd031054dceaa50dd3213dc0f0ead62d1240989f050571b5e84b155630d3799a378303388c05eef572f987a44e631bb2e997729ab5533348d940c99f49eecc774d69f06238353898504144521c80201082eda26718631d0e0294c5b5938e0140531eee9cff1f0e2ecac87a528d9a7cd268266bb8adb28d4dad3b46f68febf7ad36fbeedd1c57e2285f78577aa4a025a9689bcff50cc791109a58bc1251e75"}, {0xd0, 0x0, 0x0, "1a52506eee3b536c73d2ff00605f523a0dc452cc0a72d2c05dff438a6da2d75b2484d08882ed8038e9c3a527994c8d8a5cf74bd71a7fb67d4a999b101ee8ee2758db232c18a274a37226d6569539be7b05ca845c0d6c0f263d786a81d8e3f00e15806342b74a2480f6d91fa2e0f3ce0c01ce3022176ba677243018875421a6d0b1b7218b4cc3b23ad27b98dab60443f1e74a41d965605ce0c21b76bc9db41d7272511d896b520af8c79895d4e818a93bd56aaf3aed39eeab5a64a38f30b37256"}, {0x18, 0x0, 0x0, "a9bc"}], 0x258}, 0x8004) 19:15:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='attr/keycreate\x00') accept4$llc(r0, 0x0, 0x0, 0x81000) [ 677.254451][T16751] loop4: detected capacity change from 0 to 178 19:15:36 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) [ 677.356016][T16751] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 677.356016][T16751] [ 677.448709][T16751] ERROR: (device loop4): remounting filesystem as read-only [ 677.456587][T16751] xtLookup: xtSearch returned -5 [ 677.461621][T16751] read_mapping_page failed! [ 677.466852][T16751] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 677.600882][T16751] Mount JFS Failure: -5 [ 677.605734][T16751] jfs_mount failed w/return code = -5 19:15:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 677.793799][T16795] 8021q: adding VLAN 0 to HW filter on device bond49 [ 677.808807][T16795] bond0: (slave bond49): Enslaving as an active interface with an up link 19:15:36 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100"/51, 0x33, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:36 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000540)=0x11) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 677.857951][T16802] device bridge84 entered promiscuous mode [ 677.950712][T16802] bond49: (slave vlan40): Enslaving as an active interface with an up link 19:15:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r0, &(0x7f00000005c0)=@l2tp6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0x80) 19:15:36 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_CHANNEL(r0, 0x0, 0x1) socketpair(0xff20ac5bbc19d4bb, 0x1, 0x159acd51, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_CHANNEL(r1, 0x0, 0x1) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, 0x0, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xa, 0x5765, 0x400, 0x20, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 19:15:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:37 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 678.425247][T16814] loop4: detected capacity change from 0 to 178 [ 678.486005][T16814] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 678.486005][T16814] 19:15:37 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, 0x0) [ 678.568441][T16814] ERROR: (device loop4): remounting filesystem as read-only [ 678.576400][T16814] xtLookup: xtSearch returned -5 [ 678.581446][T16814] read_mapping_page failed! [ 678.586472][T16814] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:15:37 executing program 5: bpf$MAP_CREATE(0x11, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 678.714711][T16814] Mount JFS Failure: -5 [ 678.719123][T16814] jfs_mount failed w/return code = -5 19:15:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000002400)='./file0\x00', 0xff7ffffffffff000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000340)=0x1fffffffffffffff) [ 679.029482][T16826] 8021q: adding VLAN 0 to HW filter on device bond50 [ 679.045510][T16826] bond0: (slave bond50): Enslaving as an active interface with an up link 19:15:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100"/51, 0x33, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) [ 679.093853][T16863] device bridge85 entered promiscuous mode [ 679.110882][T16863] bond50: (slave vlan41): Enslaving as an active interface with an up link 19:15:37 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:38 executing program 2: bpf$MAP_CREATE(0x11, 0x0, 0x0) 19:15:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:38 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x4, 0x53, 0x0, 0x0) [ 679.522308][T16876] loop3: detected capacity change from 0 to 264192 [ 679.621338][T16879] loop4: detected capacity change from 0 to 178 [ 679.710402][T16876] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 19:15:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 679.816686][T16879] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 679.816686][T16879] [ 679.881999][T16879] ERROR: (device loop4): remounting filesystem as read-only [ 679.889647][T16879] xtLookup: xtSearch returned -5 [ 679.895353][T16879] read_mapping_page failed! [ 679.899971][T16879] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:15:38 executing program 3: bpf$MAP_CREATE(0x4, 0x0, 0x10) 19:15:38 executing program 2: io_getevents(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) [ 680.042082][T16879] Mount JFS Failure: -5 [ 680.047130][T16879] jfs_mount failed w/return code = -5 [ 680.241343][T16891] 8021q: adding VLAN 0 to HW filter on device bond51 [ 680.256289][T16891] bond0: (slave bond51): Enslaving as an active interface with an up link 19:15:39 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000540)={0x0, 0x0, 0x0}) [ 680.330390][T16933] device bridge86 entered promiscuous mode [ 680.347559][T16933] bond51: (slave vlan42): Enslaving as an active interface with an up link 19:15:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:39 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:39 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={0x1a, 0x305, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) 19:15:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001940)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 19:15:39 executing program 3: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x14f040) [ 680.978109][T16947] loop4: detected capacity change from 0 to 178 [ 681.086316][T16947] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 681.086316][T16947] 19:15:39 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 681.139346][T16947] ERROR: (device loop4): remounting filesystem as read-only [ 681.148235][T16947] xtLookup: xtSearch returned -5 [ 681.153548][T16947] read_mapping_page failed! [ 681.158176][T16947] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 681.291999][T16947] Mount JFS Failure: -5 [ 681.296890][T16947] jfs_mount failed w/return code = -5 19:15:40 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') 19:15:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) [ 681.664533][T16988] 8021q: adding VLAN 0 to HW filter on device bond52 [ 681.684127][T16988] bond0: (slave bond52): Enslaving as an active interface with an up link 19:15:40 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) gettid() mbind(&(0x7f000032a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000125000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, 0x0, 0x0) 19:15:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 681.835992][T17002] device bridge87 entered promiscuous mode [ 681.854100][T17002] bond52: (slave vlan43): Enslaving as an active interface with an up link 19:15:40 executing program 5: socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) 19:15:40 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) recvfrom$llc(r0, 0x0, 0x0, 0x40000040, 0x0, 0x0) 19:15:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 682.279102][T17010] mmap: syz-executor.3 (17010) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 682.360576][T17011] loop4: detected capacity change from 0 to 178 [ 682.483803][T17011] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 682.483803][T17011] [ 682.599434][T17011] ERROR: (device loop4): remounting filesystem as read-only [ 682.607351][T17011] xtLookup: xtSearch returned -5 [ 682.612414][T17011] read_mapping_page failed! [ 682.617321][T17011] jfs_mount: diMount(ipaimap) failed w/rc = -5 19:15:41 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 19:15:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:41 executing program 2: syz_open_procfs(0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) socket$l2tp(0x2, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xa, 0x5765, 0x400, 0x20, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) [ 682.817477][T17011] Mount JFS Failure: -5 [ 682.821841][T17011] jfs_mount failed w/return code = -5 19:15:41 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000140), 0x4) [ 683.127811][T17058] 8021q: adding VLAN 0 to HW filter on device bond53 [ 683.143647][T17058] bond0: (slave bond53): Enslaving as an active interface with an up link 19:15:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) [ 683.191183][T17062] device bridge88 entered promiscuous mode [ 683.214131][T17062] bond53: (slave vlan44): Enslaving as an active interface with an up link 19:15:42 executing program 3: syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') 19:15:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:42 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) [ 683.681702][T17075] loop4: detected capacity change from 0 to 178 19:15:42 executing program 2: rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) rseq(0x0, 0x0, 0x0, 0x0) [ 683.766524][T17075] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 683.766524][T17075] [ 683.869324][T17075] ERROR: (device loop4): remounting filesystem as read-only [ 683.877038][T17075] xtLookup: xtSearch returned -5 [ 683.882077][T17075] read_mapping_page failed! [ 683.886968][T17075] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 684.014127][T17075] Mount JFS Failure: -5 [ 684.018540][T17075] jfs_mount failed w/return code = -5 19:15:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4020940d, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 684.148436][T17085] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:15:42 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000240)="90e42e8500000000000001000000000020001b8479061454f592000000480000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000000080)) [ 684.523770][T17112] 8021q: adding VLAN 0 to HW filter on device bond54 [ 684.544286][T17112] bond0: (slave bond54): Enslaving as an active interface with an up link [ 684.572205][T17113] device bridge89 entered promiscuous mode [ 684.589348][T17113] bond54: (slave vlan45): Enslaving as an active interface with an up link 19:15:43 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 19:15:43 executing program 3: mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000040)={0x8, 0x70}, 0x20) 19:15:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 684.964130][T17137] loop4: detected capacity change from 0 to 178 19:15:43 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 685.053302][T17143] loop5: detected capacity change from 0 to 256 [ 685.061390][T17137] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 685.069303][T17137] Mount JFS Failure: -5 [ 685.073821][T17137] jfs_mount failed w/return code = -5 19:15:43 executing program 3: syz_open_dev$dri(&(0x7f00000000c0), 0xab, 0x0) 19:15:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:44 executing program 2: bpf$MAP_CREATE(0x5, 0x0, 0x0) 19:15:44 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, &(0x7f0000000000), 0x1e) [ 685.498151][T17151] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 685.706180][T17158] 8021q: adding VLAN 0 to HW filter on device bond55 [ 685.722310][T17158] bond0: (slave bond55): Enslaving as an active interface with an up link [ 685.724034][T17157] loop4: detected capacity change from 0 to 178 [ 685.812677][T17197] device bridge90 entered promiscuous mode [ 685.830134][T17197] bond55: (slave vlan46): Enslaving as an active interface with an up link [ 685.921963][T17157] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 685.929453][T17157] Mount JFS Failure: -5 [ 685.933946][T17157] jfs_mount failed w/return code = -5 19:15:44 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:44 executing program 3: shmget(0x3, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 19:15:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:45 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000001800)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, 0x0) 19:15:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) [ 686.572170][T17213] loop4: detected capacity change from 0 to 178 19:15:45 executing program 3: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 686.677140][T17213] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 686.687518][T17213] Mount JFS Failure: -5 [ 686.691775][T17213] jfs_mount failed w/return code = -5 19:15:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00'}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:45 executing program 2: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) [ 686.970863][T17227] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 687.114171][ T8341] usb 6-1: new high-speed USB device number 6 using dummy_hcd [ 687.192644][T17231] 8021q: adding VLAN 0 to HW filter on device bond56 [ 687.213273][T17231] bond0: (slave bond56): Enslaving as an active interface with an up link [ 687.255977][T17266] device bridge91 entered promiscuous mode [ 687.273715][T17266] bond56: (slave vlan47): Enslaving as an active interface with an up link [ 687.333722][ T8341] usb 6-1: device descriptor read/64, error 18 19:15:46 executing program 3: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x1400004) read(r0, &(0x7f0000000440)=""/67, 0x43) 19:15:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00'}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 687.614052][ T8341] usb 6-1: new high-speed USB device number 7 using dummy_hcd 19:15:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) bind$unix(r0, 0x0, 0x0) [ 687.737175][T17274] loop4: detected capacity change from 0 to 178 [ 687.812390][T17274] Mount JFS Failure: -22 [ 687.817158][T17274] jfs_mount failed w/return code = -22 [ 687.824085][ T8341] usb 6-1: device descriptor read/64, error 18 19:15:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) fchmod(r0, 0x0) [ 687.944549][ T8341] usb usb6-port1: attempt power cycle 19:15:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) [ 688.230223][T17286] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 688.369720][ T8341] usb 6-1: new high-speed USB device number 8 using dummy_hcd [ 688.439123][T17325] 8021q: adding VLAN 0 to HW filter on device bond57 [ 688.454246][T17325] bond0: (slave bond57): Enslaving as an active interface with an up link [ 688.514845][T17326] device bridge92 entered promiscuous mode [ 688.530661][ T8341] usb 6-1: Invalid ep0 maxpacket: 0 [ 688.537285][T17326] bond57: (slave vlan48): Enslaving as an active interface with an up link [ 688.658518][T17332] loop4: detected capacity change from 0 to 178 [ 688.684345][ T8341] usb 6-1: new high-speed USB device number 9 using dummy_hcd [ 688.742905][T17332] Mount JFS Failure: -22 [ 688.747839][T17332] jfs_mount failed w/return code = -22 [ 688.784507][ T8341] usb 6-1: Invalid ep0 maxpacket: 0 [ 688.792628][ T8341] usb usb6-port1: unable to enumerate USB device 19:15:48 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x1023, 0x0, 0x0) 19:15:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00'}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:15:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) fchdir(r0) 19:15:48 executing program 3: poll(0x0, 0x0, 0xfffffffa) 19:15:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:48 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) [ 689.938672][T17348] loop4: detected capacity change from 0 to 178 [ 689.979640][T17350] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 690.222211][T17390] 8021q: adding VLAN 0 to HW filter on device bond58 [ 690.238858][T17390] bond0: (slave bond58): Enslaving as an active interface with an up link 19:15:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="d5", 0x1}, {0x0}, {&(0x7f0000000240)='p', 0x1}], 0x3}, 0x0) [ 690.268446][T17348] Mount JFS Failure: -22 [ 690.272939][T17348] jfs_mount failed w/return code = -22 [ 690.290772][T17350] device bridge93 entered promiscuous mode 19:15:49 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = dup(r0) dup2(r1, r0) [ 690.544382][T17350] bond58: (slave vlan49): Enslaving as an active interface with an up link 19:15:49 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:49 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = dup(r0) r2 = dup3(r0, r1, 0x0) dup2(r1, r2) 19:15:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c00020008000100"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:15:49 executing program 3: chmod(&(0x7f0000000100)='./file0\x00', 0x0) 19:15:49 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = dup(r0) r2 = dup3(r0, r1, 0x0) r3 = dup2(r1, r2) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) unlinkat(r5, &(0x7f0000000340)='./file0\x00', 0x0) 19:15:49 executing program 2: chdir(&(0x7f00000104c0)='./file0\x00') [ 691.178029][T17408] loop4: detected capacity change from 0 to 178 [ 691.267685][T17408] Mount JFS Failure: -22 [ 691.272202][T17408] jfs_mount failed w/return code = -22 [ 691.315467][T17415] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 691.486750][T17453] 8021q: adding VLAN 0 to HW filter on device bond59 [ 691.501859][T17453] bond0: (slave bond59): Enslaving as an active interface with an up link 19:15:50 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = dup(r0) ftruncate(r1, 0x0) [ 691.602137][T17458] device bridge94 entered promiscuous mode [ 691.619411][T17458] bond59: (slave vlan50): Enslaving as an active interface with an up link 19:15:50 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:50 executing program 3: chmod(&(0x7f0000000100)='./file0\x00', 0x0) 19:15:50 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1, 0x16}]}, 0x18}}, 0x0) 19:15:50 executing program 0: r0 = fsopen(&(0x7f0000000000)='pstore\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 19:15:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 692.200941][T17469] loop4: detected capacity change from 0 to 178 [ 692.282081][T17469] Mount JFS Failure: -22 [ 692.287024][T17469] jfs_mount failed w/return code = -22 19:15:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x1dda, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000db000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) fcntl$dupfd(r1, 0x0, r0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_CLOSE, 0x0) io_uring_enter(r1, 0x690e, 0x0, 0x0, 0x0, 0x0) 19:15:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)) 19:15:51 executing program 3: chmod(&(0x7f0000000100)='./file0\x00', 0x0) 19:15:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x1dda, &(0x7f0000000400), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000db000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_CLOSE, 0x0) io_uring_enter(r1, 0x690e, 0x0, 0x0, 0x0, 0x0) [ 692.644545][T17479] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 692.899582][T17489] loop2: detected capacity change from 0 to 4 19:15:51 executing program 3: chmod(&(0x7f0000000100)='./file0\x00', 0x0) 19:15:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:15:52 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000340)={{0x0, 0x1f2b, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, 0xf3}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005f100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x0, "b67d5166ab9c79"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001e80)={{0x0, 0x2, 0x6, 0x6a58, 0x400, 0x8, 0x6, 0x17f580, 0x1, 0x5, 0x4, 0x2, 0x28f, 0x4, 0x5f92}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) getpgid(0xffffffffffffffff) unshare(0x42000000) 19:15:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 693.918056][T17502] loop4: detected capacity change from 0 to 178 [ 693.992760][T17502] Mount JFS Failure: -22 [ 693.998693][T17502] jfs_mount failed w/return code = -22 19:15:52 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, 0x0) 19:15:52 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) [ 694.479136][T17517] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 19:15:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x1dda, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000db000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) fcntl$dupfd(r1, 0x0, r0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_CLOSE, 0x0) io_uring_enter(r1, 0x690e, 0x0, 0x0, 0x0, 0x0) 19:15:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x8001) [ 694.909147][T17524] binder: 17515:17524 ioctl 40046210 0 returned -14 19:15:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4020940d, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) [ 695.673603][T17534] loop4: detected capacity change from 0 to 178 19:15:54 executing program 2: syz_usb_connect$cdc_ncm(0x2, 0x91, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7f, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6, 0x24, 0x1a, 0x101}, [@mdlm_detail={0x23, 0x24, 0x13, 0x0, "84f35079e4806d576a65fd7cf90fc42153394223a7ff76d2f8203104f915b7"}]}, {{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x0, 0xff, 0x7e}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x7f, 0x5, 0xa4}}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x3f, 0x9, 0x7b}}}}}}}]}}, 0x0) 19:15:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 695.849341][T17534] Mount JFS Failure: -22 [ 695.854282][T17534] jfs_mount failed w/return code = -22 19:15:54 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000340)={{0x0, 0x1f2b, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, 0xf3}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005f100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x0, "b67d5166ab9c79"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001e80)={{0x0, 0x2, 0x6, 0x6a58, 0x400, 0x8, 0x6, 0x17f580, 0x1, 0x5, 0x4, 0x2, 0x28f, 0x4, 0x5f92}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) getpgid(0xffffffffffffffff) unshare(0x42000000) 19:15:55 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) 19:15:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x1dda, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000db000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) fcntl$dupfd(r1, 0x0, r0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_CLOSE, 0x0) io_uring_enter(r1, 0x690e, 0x0, 0x0, 0x0, 0x0) [ 696.848716][T17568] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 696.873391][T16246] usb 3-1: new full-speed USB device number 7 using dummy_hcd 19:15:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000800000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)) [ 697.066537][T17580] loop4: detected capacity change from 0 to 178 [ 697.099679][T17580] Mount JFS Failure: -22 [ 697.104866][T17580] jfs_mount failed w/return code = -22 [ 697.253897][T16246] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 697.265747][T16246] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1023, setting to 64 [ 697.277191][T16246] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid maxpacket 1023, setting to 64 [ 697.288457][T16246] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 19:15:56 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x1dda, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000db000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) fcntl$dupfd(r1, 0x0, r0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_CLOSE, 0x0) io_uring_enter(r1, 0x690e, 0x0, 0x0, 0x0, 0x0) 19:15:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) [ 697.679759][T17592] loop3: detected capacity change from 0 to 4 [ 697.724113][T17592] EXT4-fs (loop3): Invalid log block size: 8 [ 697.786232][T16246] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 697.795576][T16246] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 697.804146][T16246] usb 3-1: Product: syz [ 697.808429][T16246] usb 3-1: Manufacturer: syz [ 697.813246][T16246] usb 3-1: SerialNumber: syz 19:15:56 executing program 3: fsopen(&(0x7f0000001080)='virtiofs\x00', 0x0) [ 698.020909][T17601] loop4: detected capacity change from 0 to 178 [ 698.041524][T17563] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 698.071754][T17605] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 698.091876][T17601] Mount JFS Failure: -22 [ 698.096678][T17601] jfs_mount failed w/return code = -22 [ 698.106566][T17605] bond60 (uninitialized): Released all slaves 19:15:57 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x5452, 0x0) [ 698.354182][T16246] cdc_ncm 3-1:1.0: bind() failure [ 698.422909][T16246] cdc_ncm 3-1:1.1: CDC Union missing and no IAD found [ 698.430179][T16246] cdc_ncm 3-1:1.1: bind() failure [ 698.578253][T16246] usb 3-1: USB disconnect, device number 7 19:15:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000300)) 19:15:57 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600", 0xb, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) [ 699.203762][T17632] loop4: detected capacity change from 0 to 178 [ 699.257111][T17632] Currently only 4K block size supported! [ 699.263320][T17632] Mount JFS Failure: -22 [ 699.267702][T17632] jfs_mount failed w/return code = -22 [ 699.282069][T17654] loop2: detected capacity change from 0 to 4 19:15:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xf, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x6b) 19:15:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:15:58 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000040)='/dev/vcsa#\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) 19:15:58 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x40049409, 0x0) [ 699.311293][ T1199] ieee802154 phy0 wpan0: encryption failed: -22 [ 699.318154][ T1199] ieee802154 phy1 wpan1: encryption failed: -22 [ 699.350693][T17654] EXT4-fs (loop2): invalid first ino: 0 [ 699.488705][T17662] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 699.565432][T17662] bond60 (uninitialized): Released all slaves 19:15:58 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x4c, 0x0, &(0x7f0000000180)=[@increfs, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000380)="a8"}) 19:15:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600", 0xb, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:15:58 executing program 3: fsmount(0xffffffffffffffff, 0x99b125056eaac1e5, 0x0) 19:15:58 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000340)={{0x0, 0x1f2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, 0xf3}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_open_dev$loop(0x0, 0x75f, 0x103382) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) unshare(0x42000000) 19:15:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x4c}}, 0x0) 19:15:58 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x2000)=nil, 0x930, 0x4, 0x10, r0, 0x0) [ 700.227589][T17684] loop4: detected capacity change from 0 to 178 19:15:59 executing program 2: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x21bda, &(0x7f0000000640), 0x0, &(0x7f0000000700)={[{@fat=@showexec}, {@fat=@check_strict}]}) [ 700.407298][T17684] Currently only 4K block size supported! [ 700.413869][T17684] Mount JFS Failure: -22 [ 700.418206][T17684] jfs_mount failed w/return code = -22 19:15:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 19:15:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600", 0xb, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) [ 700.781387][T17695] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 700.902603][T17695] bond60 (uninitialized): Released all slaves 19:15:59 executing program 0: syz_usb_connect$cdc_ncm(0x2, 0x12a, &(0x7f0000000040)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x118, 0x2, 0x1, 0x6, 0x80, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5, 0x24, 0x0, 0x9129}, {0xd, 0x24, 0xf, 0x1, 0x3ff, 0x100, 0x7ff, 0x8}, {0x6, 0x24, 0x1a, 0x101}, [@mdlm_detail={0xb0, 0x24, 0x13, 0x81, "84f35079e4806d576a65fd7cf90fc42153394223a7ff76d2f8203104f915b7fca50d52d468e830ed46903d8d1e726043862de8eed7462ff08c82053054a6bec5faed69d9e98734cb575e29f31bac07b11b418f79e30acbaae854e198be350d7917f1d0fdba5c301cc3260479219fb02e831dde8c1bdcdc01e96b27dc43a3dd53df20aaa9c48c0cb9897ce040bdba14c43e5a1553c8f1b7f92046c39fa6cea5ee6a671e5e9b5dcf1023da8540"}, @obex={0x5, 0x24, 0x15, 0x9}, @network_terminal={0x7, 0x24, 0xa, 0x1, 0xcb, 0x7f, 0x5}]}, {{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x31, 0xff, 0x7e}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x7f, 0x5, 0xa4}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x3f, 0x9, 0x7b}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000180)={0xa, 0x6, 0x310, 0xff, 0x80, 0x6, 0x8, 0xfd}, 0x22, &(0x7f00000001c0)={0x5, 0xf, 0x22, 0x6, [@ptm_cap={0x3}, @ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x8, 0x1, 0x2, 0x3ff}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x4, 0x6, 0x8175}, @ptm_cap={0x3}]}, 0x6, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x180c}}, {0xdb, &(0x7f0000000240)=@string={0xdb, 0x3, "21de8b887d69e84a94929ac43cfeb4d6ce26218bd6bd941615b3cfbb6722cc8b7a54d12ecc73c467e12dc46cd70705b5d66f09cc541ae40ec235b50c20b2107caf5d528f74b258f465959451c977f1bb481f72e0e950a62edc6989feba592becf1353a6b8a8ac84c08609211c4f44aa52193367fcba949209a0a3d03ca44158719bdf6abcc2203f8aaa5b6fccaad395ff310aabb99f6e6765d96e7f8e434e584dca1f1da219ccd4381155264438c61f7c1237db83b7365c748f25408839e1123e3c5dfff014dfc30a0b4b4713150ae25bc6a562e6de4ea41df"}}, {0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x411}}, {0x50, &(0x7f0000000500)=ANY=[@ANYBLOB="5003ca87a2df3465b08d394174e5250cdfdd14682c462ed4431407807f0ba6b86e2d3a1b77868e31e87467216ad9772890a6c90ce2cc54603d82191e97730bdca0397da6bb4f7346d093e26b9bee2b2bf3ce36c32190ea890520e61c8eb4978d16978aed0ddc4708ae42"]}, {0x4, &(0x7f0000000400)=@lang_id={0x4, 0x3, 0x2e3b}}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0x3009}}]}) syz_open_dev$rtc(&(0x7f0000000000), 0xfffffffffffff3a1, 0x218401) 19:16:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0xc0045878, 0x0) [ 701.477668][T17707] loop4: detected capacity change from 0 to 178 [ 701.569455][T17707] Currently only 4K block size supported! [ 701.576193][T17707] Mount JFS Failure: -22 [ 701.580548][T17707] jfs_mount failed w/return code = -22 19:16:00 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000", 0x10, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) [ 701.984199][ T8320] usb 1-1: new full-speed USB device number 5 using dummy_hcd 19:16:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) 19:16:00 executing program 3: select(0x40, &(0x7f0000000180), 0x0, &(0x7f00000000c0), 0x0) [ 702.408072][ T8320] usb 1-1: not running at top speed; connect to a high speed hub [ 702.474560][T17725] loop4: detected capacity change from 0 to 178 [ 702.532933][T17725] Currently only 4K block size supported! [ 702.540358][T17725] Mount JFS Failure: -22 [ 702.544895][T17725] jfs_mount failed w/return code = -22 [ 702.552447][ T8320] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1023, setting to 64 [ 702.563812][ T8320] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid maxpacket 1023, setting to 64 [ 702.575020][ T8320] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid maxpacket 1023, setting to 64 19:16:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 702.948201][ T8320] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 702.957706][ T8320] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 702.968405][ T8320] usb 1-1: Product: Б [ 702.972632][ T8320] usb 1-1: Manufacturer: 袋楽䫨銔쒚︼횴⛎謡뷖ᚔ댕ë¯â‰§è¯Œå‘ºâ»‘çŒæŸ„ⷡ泄ߗ딅濖찉ᩔ໤㗂ವ눠ç°å¶¯è½’뉴镥冔矉믱Ὀî²åƒ©âº¦æ§œïº‰å¦ºî°«ã—±æ¬ºèªŠä³ˆæ€ˆá†’ꕊ錡缶꧋â‰àªšÌ½ä“Šèœ•ë´™ê¯¶â‹Œï ƒê–ªï²¶ê·Šå¼¹áƒ³ë®ªïš™ç›¦é™ï£§ã“¤è“¥ê‡œé°¡äá–摒豃ï¡â롽猻ì¥ï‰ˆà¡”麃⌑엣￟ä´ãƒ¼ë’ ç†´å€±â–®æª¼â¹–䇪 [ 703.006533][ T8320] usb 1-1: SerialNumber: 蟊攴趰䄹థ栔䘬í®á‘ƒè€‡à­¿ë¢¦âµ®á¬ºè™·ã†Žç“¨â…§â¡·êšà³‰ì³¢æ”舽ḙ玗㦠꙽侻䙳é毢⬫ 19:16:02 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000340)={{0x0, 0x1f2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, 0xf3}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_open_dev$loop(0x0, 0x75f, 0x103382) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) unshare(0x42000000) 19:16:02 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000", 0x10, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:16:02 executing program 2: r0 = fsopen(&(0x7f0000000040)='erofs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='erofs\x00', &(0x7f0000000080)='./file0\x00', r1) 19:16:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0xc0189436, 0x0) [ 703.558313][T17711] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 703.699587][T17764] loop4: detected capacity change from 0 to 178 [ 703.752119][T17764] Currently only 4K block size supported! [ 703.759651][T17764] Mount JFS Failure: -22 [ 703.764322][T17764] jfs_mount failed w/return code = -22 19:16:02 executing program 2: ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) r0 = syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) read$msr(r0, &(0x7f0000000040)=""/232, 0xe8) [ 703.915125][ T8320] cdc_ncm 1-1:1.0: bind() failure 19:16:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 703.986292][ T8320] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 703.997258][ T8320] cdc_ncm 1-1:1.1: bind() failure [ 704.171958][ T8320] usb 1-1: USB disconnect, device number 5 19:16:03 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x5451, 0x0) 19:16:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000", 0x10, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:16:03 executing program 3: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 19:16:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000001640)=[@text64={0x40, &(0x7f00000000c0)="20d835080000000f22d85681ae400f01c301c375670066b803000f00d8f9450f304ddc0866b8a1008ee066baf80cb872f1a681ef66bafc0c66b8c0190f0134c4", 0x40}], 0x1, 0x70, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 705.391627][T17814] loop4: detected capacity change from 0 to 178 [ 705.511940][T17814] Currently only 4K block size supported! [ 705.519074][T17814] Mount JFS Failure: -22 [ 705.523766][T17814] jfs_mount failed w/return code = -22 19:16:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x14}, 0x14}}, 0x0) 19:16:04 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_open_dev$loop(0x0, 0x0, 0x103382) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x42000000) 19:16:05 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x44, 0x0, &(0x7f0000000180)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 19:16:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000001640)=[@text64={0x40, &(0x7f00000000c0)="20d835080000000f22d85681ae400f01c301c375670066b803000f00d8f9450f304ddc0866b8a1008ee066baf80cb872f1a681ef66bafc0c66b8c0190f0134c4", 0x40}], 0x1, 0x70, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:16:05 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000", 0x13, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:16:05 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) [ 706.925556][T17845] loop4: detected capacity change from 0 to 178 [ 707.039820][T17845] jfs_mount: Mount Failure: superblock is corrupt! [ 707.047092][T17845] Mount JFS Failure: -22 [ 707.051431][T17845] jfs_mount failed w/return code = -22 19:16:06 executing program 3: r0 = fsopen(&(0x7f0000001080)='virtiofs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f00000010c0)='virtiofs\x00', &(0x7f0000001100)='q', 0x1) 19:16:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000", 0x13, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:16:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000001640)=[@text64={0x40, &(0x7f00000000c0)="20d835080000000f22d85681ae400f01c301c375670066b803000f00d8f9450f304ddc0866b8a1008ee066baf80cb872f1a681ef66bafc0c66b8c0190f0134c4", 0x40}], 0x1, 0x70, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:16:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:06 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x40045568, 0x0) 19:16:06 executing program 3: syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000080)=[0x0, 0x7fff]) [ 708.016216][T17890] loop4: detected capacity change from 0 to 178 [ 708.171698][T17890] jfs_mount: Mount Failure: superblock is corrupt! [ 708.178981][T17890] Mount JFS Failure: -22 [ 708.183727][T17890] jfs_mount failed w/return code = -22 19:16:07 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) 19:16:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000001640)=[@text64={0x40, &(0x7f00000000c0)="20d835080000000f22d85681ae400f01c301c375670066b803000f00d8f9450f304ddc0866b8a1008ee066baf80cb872f1a681ef66bafc0c66b8c0190f0134c4", 0x40}], 0x1, 0x70, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:16:07 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0xc06855c8, 0x0) 19:16:07 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000", 0x13, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:16:07 executing program 3: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x4, [{0x4, &(0x7f0000000200)=@lang_id={0x4}}, {0x2, &(0x7f0000000240)=@string={0x2}}, {0x0, 0x0}, {0x50, 0x0}]}) 19:16:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:07 executing program 5: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000340)={{0x0, 0x1f2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf3}}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001e80)={{0x0, 0x2, 0x0, 0x0, 0x0, 0x8, 0x6, 0x17f580, 0x1, 0x5, 0x4, 0x2, 0x28f, 0x4, 0x5f92}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x42000000) [ 709.156175][T17924] loop4: detected capacity change from 0 to 178 [ 709.270889][T17924] jfs_mount: Mount Failure: superblock is corrupt! [ 709.278140][T17924] Mount JFS Failure: -22 [ 709.282518][T17924] jfs_mount failed w/return code = -22 19:16:08 executing program 2: bpf$PROG_LOAD(0x1e, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 19:16:08 executing program 0: syz_open_dev$vcsa(&(0x7f0000000180), 0x0, 0x200) [ 709.551953][ T2827] usb 4-1: new high-speed USB device number 4 using dummy_hcd 19:16:08 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000", 0x14, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:16:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 709.794770][ T2827] usb 4-1: Using ep0 maxpacket: 32 [ 709.914470][ T2827] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 709.925791][ T2827] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 709.939234][ T2827] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 709.949999][ T2827] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 709.960194][ T2827] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 709.970188][ T2827] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 19:16:08 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) 19:16:08 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) [ 710.210343][T17946] loop4: detected capacity change from 0 to 178 [ 710.329606][T17946] jfs_mount: Mount Failure: superblock is corrupt! [ 710.336638][T17946] Mount JFS Failure: -22 [ 710.346126][T17946] jfs_mount failed w/return code = -22 19:16:09 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000", 0x14, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:16:09 executing program 0: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000340)={{0x0, 0x1f2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf3}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x42000000) [ 710.935923][ T2827] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 710.945498][ T2827] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 19:16:09 executing program 2: r0 = syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000080)=[0x0, 0x7fff]) [ 711.129891][T17968] loop4: detected capacity change from 0 to 178 [ 711.161834][T17968] jfs_mount: Mount Failure: superblock is corrupt! [ 711.169320][T17968] Mount JFS Failure: -22 [ 711.173918][T17968] jfs_mount failed w/return code = -22 [ 711.403867][ T2827] cdc_ncm 4-1:1.0: bind() failure [ 711.419626][ T2827] cdc_ncm 4-1:1.1: CDC Union missing and no IAD found [ 711.426968][ T2827] cdc_ncm 4-1:1.1: bind() failure [ 711.605974][ T2827] usb 4-1: USB disconnect, device number 4 19:16:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000000)={0xff, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) 19:16:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085460000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000", 0x14, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:16:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r0) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x28}}, 0x0) 19:16:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7}, 0x40) [ 712.252158][T18011] loop4: detected capacity change from 0 to 178 [ 712.441647][T18011] jfs_mount: Mount Failure: superblock is corrupt! [ 712.448793][T18011] Mount JFS Failure: -22 [ 712.453625][T18011] jfs_mount failed w/return code = -22 19:16:11 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x4008556c, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) [ 712.557495][T18012] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:11 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001e80)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x17f580, 0x1, 0x5, 0x0, 0x0, 0x28f, 0x0, 0x5f92}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x42000000) 19:16:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:16:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085460000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:11 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x400, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) dup3(r1, r0, 0x0) [ 713.348189][T18037] loop4: detected capacity change from 0 to 178 [ 713.407800][T18037] Mount JFS Failure: -22 [ 713.415018][T18037] jfs_mount failed w/return code = -22 [ 713.847613][T18038] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:17 executing program 0: syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 19:16:17 executing program 5: add_key$user(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 19:16:17 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000200), 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, 0x0, 0x0, 0x0) 19:16:17 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) 19:16:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085460000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 718.990856][T18129] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 719.049089][T18132] loop4: detected capacity change from 0 to 178 19:16:17 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xd) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x1}, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000100)='./file0\x00', 0x1f) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[], 0x141) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 719.169481][T18132] Mount JFS Failure: -22 [ 719.174459][T18132] jfs_mount failed w/return code = -22 19:16:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$dir(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 19:16:18 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f000006d200)) [ 719.937389][T18158] loop4: detected capacity change from 0 to 178 [ 720.023524][T18158] Mount JFS Failure: -22 [ 720.028031][T18158] jfs_mount failed w/return code = -22 19:16:19 executing program 2: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001e80)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x17f580, 0x1, 0x5, 0x0, 0x0, 0x28f, 0x0, 0x5f92}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x42000000) 19:16:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002a40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}], 0x20}, 0x0) 19:16:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000400), 0x4) socket$netlink(0x10, 0x3, 0xe) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010427bd7000fcdbdf25010000b389b08700050000000800020000000000c6254c33b4cabccd03ba391c006c9a995172163954ba9a694d1118342897b02efa982e54a3144d664174f1d76535dad27dd883e7d6e4d62f4840634e4b47cb7ccb14caf7c08d9740a844670979b57492860bd40139ed78e00c2f93976fb22861a31c6d4ef0136fabf8b1a8c7b5550fa44e3c828d9cb98053359e677cdfa30afe51be60a449975ae0927dfb8720b3e3cd"], 0x24}}, 0x4) 19:16:19 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, 0x0) 19:16:19 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x10}, 0x10}}, 0x0) [ 721.064191][T18172] loop4: detected capacity change from 0 to 178 [ 721.140234][T18178] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 721.200246][T18179] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 19:16:20 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000003800), 0xc}, 0x0) 19:16:20 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, 0x0) 19:16:20 executing program 0: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, 0x0) 19:16:20 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') 19:16:20 executing program 3: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) shmat(0x0, &(0x7f0000ffa000/0x1000)=nil, 0x0) [ 722.552591][T18196] loop4: detected capacity change from 0 to 178 19:16:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 723.317941][T18228] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:22 executing program 4: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080", 0x36, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, 0x0) 19:16:22 executing program 0: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000002a00)={{0x0, 0xffffffffffffffff}}) 19:16:22 executing program 3: r0 = socket(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x20, &(0x7f0000000080), 0x0) 19:16:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2}, 0x10) sendto$inet(r0, &(0x7f0000000000)="10", 0x1, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 19:16:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:22 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x100, &(0x7f0000000540)={0x10, 0x2}, 0x10) [ 723.968978][T18244] loop4: detected capacity change from 0 to 178 19:16:22 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000002240), &(0x7f0000002280)=0x8) 19:16:22 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000100)={0x1c, 0x1c}, 0x1c) 19:16:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000380), &(0x7f0000000140)=0x98) [ 724.318925][T18251] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:23 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@un=@file={0xa}, 0xa) 19:16:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff010000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func]}}, &(0x7f0000000040)=""/241, 0x26, 0xf1, 0x1}, 0x20) 19:16:23 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001840)=@bpf_lsm={0x1d, 0xf4240, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:16:23 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team_slave_0\x00', &(0x7f0000000000)=@ethtool_stats}) 19:16:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 19:16:24 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000017c0)={&(0x7f0000000240)=@abs={0x8}, 0x8, 0x0}, 0x85) 19:16:24 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000180)="b2d32612be59a32544f722c3fd9cff21e4892b27c1a2a4b51b1b3982977dee7a3ed4a2be4d08ec110bfad4c1bbb67956050f722a37abb01ee5e80949e2d3d964edf2b9321f0855f3198c344aae6c290a1d000e164bfbfa335934a287a8a792e3ee6e38661d61aecafb834ce8aacdd715fbf6777479bb45cb7399f3ec7e9ba07e0b1778c5bc7d1fa059225250fe9f8ecf9bd1e21ed6f27c782e2cb5b5355837498668bb279fcbcf02dbfd1a40e4a4c22cf1756ab09b66ecdf1aff0e9abbc8ade2c82afce3c69095918f80f16e56563169b5cef6daf8a802a60551b1b9b824a3b3b271e3e3317c746ce0bb701673cd3de7ad31", 0xf2}, {&(0x7f0000000340)="518ae4f289b95395663da514ea9dc47a97087e61d45f70eb7a16ec63b83848099ada16af5a0767722f90d2a8ea85f224c466f372b5c98a5fc4a2323e798e34a1ddce473525e746388e1d97ac675d94e12fc9014cc3bfff17cf8a8efc2a", 0x5d}, {&(0x7f00000003c0)="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", 0xea2}], 0x3}, 0x0) 19:16:24 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x1}, 0x1c) 19:16:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x1) [ 726.227012][T18283] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000000)="10", 0x1, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 19:16:25 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) 19:16:25 executing program 4: r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x34, 0x2}, 0x10) 19:16:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff010000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 19:16:25 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x24, &(0x7f00000001c0)="a7b84157", 0x4) 19:16:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) dup2(r0, r1) 19:16:25 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000340)={0x1c, 0x1c}, 0x1c) 19:16:25 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) [ 727.230332][T18322] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000100), &(0x7f0000000180)=0x8) 19:16:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, @in, 0x0, 0x0, 0x20d}, 0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080), &(0x7f0000000140)=0x98) 19:16:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff010000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, @in, 0x0, 0x0, 0x104}, 0x98) 19:16:26 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) sendto$inet(r2, &(0x7f0000000000)='t', 0x1, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 19:16:26 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 19:16:26 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1c, 0x1c, 0x1}, 0x1c) 19:16:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqsrc(r0, 0x0, 0xe, 0x0, &(0x7f0000000100)) [ 728.402709][T18352] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:27 executing program 2: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) 19:16:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 19:16:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff01000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:27 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001080)=@in6={0x1c, 0x1c}, 0x1c) 19:16:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) 19:16:27 executing program 5: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, 0x0) 19:16:28 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001080)=@in6={0x1c, 0x1c}, 0x1c) 19:16:28 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x180, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) [ 729.754044][T18386] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:28 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000002680)={0x0, 0x0, 0x0}, 0x400c2) 19:16:28 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, &(0x7f0000000040)='H', 0x1, 0x0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) 19:16:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={r2, 0x0, 0x0, 0xf}, 0x14) 19:16:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff01000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:28 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000080), 0x10) 19:16:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f00000001c0)={0x0, 0x8}, 0x8) 19:16:29 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x33, 0x0, 0x0) 19:16:29 executing program 0: r0 = socket$inet6(0x1c, 0x3, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 19:16:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x104, &(0x7f0000001980), &(0x7f00000019c0)=0x4) [ 730.987462][T18422] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:29 executing program 2: fchownat(0xffffffffffffffff, &(0x7f0000001900)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0) 19:16:30 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 19:16:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff01000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, @in, 0x0, 0x0, 0x20d}, 0x98) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000180)="b2", 0x1}], 0x1}, 0x0) 19:16:30 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x51, 0x0, 0x0) 19:16:30 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) 19:16:30 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x5c, 0x1c, 0x2}, 0x1c) [ 732.145418][T18450] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 19:16:31 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x27, &(0x7f0000000200), 0x4) 19:16:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000240)={0x0, @in, 0x0, 0x0, 0x80}, 0x98) 19:16:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x10, 0x2}, 0x10) 19:16:31 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x10, &(0x7f0000000200)=0x4, 0x4) 19:16:31 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 19:16:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000240), 0x98) 19:16:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000240)={0x0, @in, 0x0, 0x0, 0x80, 0x0, 0x6}, 0x98) [ 733.471407][T18486] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf}, 0x14) 19:16:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000c80)={&(0x7f00000008c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000c40)=[@init={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @remote={0xac, 0x14, 0x0}}], 0x24}, 0x0) 19:16:32 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) 19:16:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:32 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, &(0x7f0000000080)="f4", 0x1, 0x0, &(0x7f0000001080)=@in6={0x1c, 0x1c}, 0x1c) 19:16:32 executing program 0: open(0x0, 0x1dcfff, 0x0) 19:16:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000080), &(0x7f0000000180)=0xc) 19:16:33 executing program 5: getresgid(0x0, &(0x7f0000000200), 0x0) 19:16:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind(r0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1}, 0x1c) [ 734.645529][T18548] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000001a80)={@multicast2, @local={0xac, 0x14, 0x0}}, 0xc) [ 734.901514][T18548] 8021q: adding VLAN 0 to HW filter on device bond61 [ 734.993427][T18548] bond0: (slave bond61): Enslaving as an active interface with an up link 19:16:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000240)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x98) 19:16:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:34 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 19:16:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='cdg\x00', 0x4) 19:16:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, &(0x7f00000000c0)={0x1, {{0x10, 0x2}}}, 0x88) 19:16:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r1, r0) bind$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) 19:16:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/112, 0x70}], 0x1) [ 735.838354][T18609] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:34 executing program 4: futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{}, {0x0, 0x100000000}}) 19:16:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x23) 19:16:34 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000040)="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", 0xfa}], 0x1, &(0x7f0000000180)=[{0xe7, 0x0, 0x0, "5fe2a9fa5076be52fee54fc1234169df4f868ea020470bc76070e187d48a470b5fd8e5d0b9ad8384a1209a3abdde9eb4c847fd6a35e76042581e3c77bc0a2273c26500053457e6a38b6638b7e6d2aedb88a5fbdec64f051411a3f963b9b525a2d056bb18e0efb1f3888bd88b8cb8575c4a4ebda79597350cd0942a45a227e97c1d6fe8137794ed3b4d4e"}, {0xc8, 0x0, 0x0, "42ab1adf7eed56d976a2b8e97a4d4423357991a95b4fae819927912b3b3f25a85163ba11d6d48254975f22970df6d9114eda6a104f79e714ceb856ed4a0f91bfa39cd4de828ed3352211c6c882f076d0491603e9f541b9b45018927e328220b9f04645bd9907dc21600d47994b01ba1cc71571b74def6b82baa988d1e31199719bf773dda1a7762589acd12b2bbcc95f26d6726874192190a028534495a081df35e5ecdf14d216696c76783c20539e70fc294c2742"}], 0x168}, 0x0) 19:16:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000440)) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x4c}}, 0x0) 19:16:35 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040), &(0x7f0000000140)=0x98) 19:16:35 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000780)={0x0, @in, 0x0, 0x0, 0x117}, 0x98) 19:16:35 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='vegas\x00', 0x6) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cubic\x00', 0x6) 19:16:35 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000008480)={&(0x7f0000005e40)=@file={0xa}, 0xa, 0x0, 0xfffffffffffffe8e, &(0x7f0000008180)=[@cred, @cred, @cred], 0x138}, 0x0) [ 736.971640][T18670] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:35 executing program 5: r0 = msgget(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000140)={{0xffffffffffffffff, 0x0, 0xffffffffffffffff}}) 19:16:36 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, &(0x7f0000000080)="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", 0xff1, 0x0, &(0x7f0000001080)=@in6={0x1c, 0x1c}, 0x1c) 19:16:36 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000000c0)='dctcp\x00', 0x6) 19:16:36 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f00000000c0)={r3, 0x2000}, 0x8) 19:16:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={r2, 0x0, 0x0, 0x0, 0x5}, 0x14) 19:16:36 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f00000000c0), &(0x7f0000000180)=0x98) 19:16:36 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x5, &(0x7f0000000000), 0x4) [ 738.373770][T18705] 8021q: adding VLAN 0 to HW filter on device bond63 [ 738.390559][T18705] bond0: (slave bond63): Enslaving as an active interface with an up link 19:16:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000440)) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x4c}}, 0x0) 19:16:37 executing program 0: mprotect(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x0) mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x6) 19:16:37 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x47, 0x0, &(0x7f0000000100)) 19:16:37 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c, 0x3}, 0x1c) 19:16:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf, 0x5}, 0x14) 19:16:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 19:16:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, @in, 0x0, 0x0, 0x28e}, 0x98) 19:16:37 executing program 3: open(&(0x7f0000000540)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:16:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0xb) [ 739.258275][T18756] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 739.496515][T18793] 8021q: adding VLAN 0 to HW filter on device bond64 [ 739.511932][T18793] bond0: (slave bond64): Enslaving as an active interface with an up link 19:16:38 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x108, &(0x7f0000000040), &(0x7f0000000080)=0x18) 19:16:38 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cubic\x00', 0x6) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='cdg\x00', 0x4) 19:16:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000440)) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0x4c}}, 0x0) 19:16:38 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000002680)={0x0, 0x0, 0x0}, 0xc0080) 19:16:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={r2, 0x0, 0x0, 0xf, 0x5}, 0x14) 19:16:38 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 19:16:39 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) [ 740.394198][T18818] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 740.547309][T18857] 8021q: adding VLAN 0 to HW filter on device bond65 [ 740.562652][T18857] bond0: (slave bond65): Enslaving as an active interface with an up link 19:16:39 executing program 2: connect$inet(0xffffffffffffffff, &(0x7f0000001300)={0x10, 0x2}, 0x10) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) write(r0, &(0x7f0000000180)="61edb6f0973c0deda080b68891912d352e39b5e78c1844ee83a5257c59771bbcbb1172c60efc529e47eda42cc391baaff7d4e9f81352fd0ee577abf05e1425d6122c3dbb8d997bdaa8c44f9a818b23ca6854eb4ac8fa49ffb18385a62f5ee2b3dbb6354402f2fe7beb3ab750d52dff111d0ff2352a5bcfffb416695456182ab678ae61e4db03a138afe820bb183b6a6722c02f1d0320dac8e7fb60dcd180b034c4b6ba5156e9032854cf2daf3564094bee955f33687a6c96dae8491bbcec819d0283f5b25e7934beae57d5acb8ed51bfc29189c8", 0xffffffcd) 19:16:39 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='cdg\x00', 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cubic\x00', 0x6) 19:16:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000100)={0x0, 0x2, 'Qz'}, &(0x7f0000000180)=0xa) 19:16:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000000080)={@multicast2}, 0xc) 19:16:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:40 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000040)='`', 0x1, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) 19:16:40 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0xc2) 19:16:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, 0x0, 0x0) 19:16:40 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, 0x0, 0x0) [ 741.735830][T18885] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000), 0x88) [ 741.994076][T18924] 8021q: adding VLAN 0 to HW filter on device bond66 [ 742.009515][T18924] bond0: (slave bond66): Enslaving as an active interface with an up link 19:16:41 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup2(r0, r1) bind(r2, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 19:16:41 executing program 5: getresgid(0x0, &(0x7f0000000200), &(0x7f0000000240)) 19:16:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:41 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, 0x0, 0x0) 19:16:41 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000100), 0x8) 19:16:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000080), &(0x7f0000000100)=0x8) 19:16:41 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = dup2(r1, r0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) 19:16:41 executing program 2: renameat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0x0) [ 743.158062][T18950] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) sendto$inet(r0, 0x0, 0x0, 0x80, &(0x7f00000000c0)={0x10, 0x2}, 0x10) [ 743.387782][T18963] 8021q: adding VLAN 0 to HW filter on device bond67 [ 743.403355][T18963] bond0: (slave bond67): Enslaving as an active interface with an up link 19:16:42 executing program 0: r0 = socket(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000dc0)=@in={0x10, 0x2}, 0x10) 19:16:42 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendto(r1, &(0x7f0000000040)='f', 0x1, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 19:16:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:42 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) connect$inet6(r0, &(0x7f00000014c0)={0x1c, 0x1c, 0x2}, 0x4) 19:16:42 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x0, 0x0) close(r0) 19:16:42 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0x2c}}, 0x0) 19:16:42 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000f3850000000d000000b7000000000000009500000000000000496cf2827fa43a431ca711fcd0cdfa146ec5618e037958e271f60d25b7977f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78bd7f34e4d5b31ae2ec0efd49897a74a0091ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb782003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704912cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3cf54a751c51160fbcbbf35b1ed777148ba532e6ea09c346df08b32808b80200000000000000334d83239dd27080e711327ef01fb6c86adac12233faa13eab3022d4a5bbfb9c2aec61ce66a38d2fd50117b89a9ab359b4eea0c6e9c18c46a032f02da783c234af4d6a325767d42b4e54fec374861d0227db6436303767d2e24f29e5dad979c32873cdc64b4df8abc18cae2ed4b4390af9a9ceafd07fd00b0000002cab154ad029a119ca3c97278087001460af81c5f4adaddd1410e80207c14140c427dc16e8b00d5ee4e5e3ae703f8ea4c3dab45f912191f9df3d7c0cf0ea4f31d062d3d6e1d09f04792f3a57a63c1d767626401485b9c9fb55010840331c9825f9386cb5c8f7e49348d27d915b8e9349b17f7aab0d75690d78d5f14805e127ca2aa3beaa073a77127fbe389324001aaae7efad93aa48d33a01e41fb317227369a10fd7bfa641635e8077e71db299396591fb8197e4e84aa18a54d1ef8ee18449a2dbf3c778e86cc74307267206abb801426c3e956d42014a0bd51815e17b489de1461f3d79b87c3ac774f9bb79d88a089cddf2155073000000000000003dd380a1af2486d6ccf4918a47312c806d0223f4586f29b0d012620a7f847daa3a0eebea812c70a0a1111a62ef04723649a40e134a70c0733643e4a6632d535e450d36ee321e02c6c1d5511c35f6652bae1b3512ac48c8479966ca33486d340241d96d858458f8fe20a6f3263b4b1f96f08aa3b4c92fa4fa9f0569c0ec8395f95187e72a9e700352a3d480ffef3eb5beb7aec0b09f45b2f0ac6b494a822e0096dc6ee996b7f66eaa0922004bbc865214a3e921408d6b3f6d000aa7aa5729ac9098e28d733b9300000002000000000000000000000000000000000069225649aa49c84ae8a08d60399210f31d2acd89b9e1a723fd231f6f9e573273d32b33d7e60f4d7b9e874e5c19c44ac9b354dbc0f3fee1d4aeb56723da289da89cc325b6b9125624a348b2ccdf6f81b94ba31a03070983c857faa5c585ce80a9ed52db658ee7ab809cd7722f7787fd460d28333b895f113eec4ef84fad96b80744c2b8dc29f9bb886e62b05ef0983f6a2f6b6b4ee522e1ad40fee92e9b7b4a1358c768bd21d991df6612f31b17829097dad5287224e18f54dea8f64902d36c17f4b83b5b71bcca94e880a644b10b74ec472efcafb5e4e994a454534d5498c12e19603abbca2127a000b8ceb249121c0a7e285732ed1d416a6deb7938419ab6d9c2a5cba3f8e277c548ab833f07d3e2c633d1a232fb8831d117c3cc5d4fa7bb28007ce31c3d5fa7b9337f89734dd43591e98a5d43f3dd759cabfdb88ef3f44bc6eddc1e9f9e36763b05a64d0c62e8580e2676e05257280720f643e5d4633c8a9a1069c975ca0686001652b086efc7d769fea19a33b612e176607f39e9aeba5cc74bf0f85af23499192166946e61414cfbdd905630253936fd0299875f2a4ce0c8a1596431a4460b533d48e1053c7030ebedd440d5059a5e9aa16e329143ebe3c81c82cc19b6a878c6038805a86a9af8372989528632e74f9ff15883ee4a60d439a588277f62561b1bfa40f0482e818625f3eb759287d5a775d7000000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newqdisc={0x24, 0x24, 0xf0b}, 0x24}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x404c800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f065581fffffff07004000632f77fbac14140ee000f00162079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x102, 0x60000000, 0x0, 0xfffffffffffffe48, &(0x7f0000000000), &(0x7f00000000c0)="61ae793cb58796e98bec67538e015077de7e272f4c58590e0a49abbb02864ce87f29c55242edc400de0f90b385e2f9c937fd3b232ab7c99460628f97e6d6f935e88684d642fd966756e2d8b5af7a9002d71c203c4dd9b55ae6eb91e77d823ca1a2de2496a532933552dfb5907808176243ef5971c1a9c84ebfbd113d1a233ed5490f124afc9b88bc97d734a20b1e"}, 0x28) [ 744.348297][T19015] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 744.612673][T19058] 8021q: adding VLAN 0 to HW filter on device bond68 [ 744.629619][T19058] bond0: (slave bond68): Enslaving as an active interface with an up link 19:16:43 executing program 2: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000286dd60a1b9c100383a00fe80000000000000d5c0c65467000000000000ef845981738faa3ebac3da32fab3"], 0x0) 19:16:43 executing program 4: syz_io_uring_setup(0x4f4d, &(0x7f0000001440)={0x0, 0xb1dc}, &(0x7f0000fd8000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fd8000/0x4000)=nil) 19:16:43 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvfrom(r0, 0x0, 0x0, 0x82, 0x0, 0x0) 19:16:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000056740)={0x0, 0x0, "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", "7ee7ac0b7b00909bfa2ef358abfaa87f4afce54b8563bfeccf57a9e176831b58ea75dc7fbed76db7ba902f37e4d4d30a34512cf955ca328e1536c3b687d93a6613e2ffb510c2beafe3e626c4b66b03f0d021fcc187cb6b41da141890d8da4d42363e345720097da8ac98e6a46394ca0629a3b08eb5a17c851b4a9f1b86ba1923750f2bbbaaeece1e4cb9ad5199a1d8bc19d0f1658450f9b627493eab36b5e38a38a5781d0fe101728df1a9c5dc54d5a1fa897a2619425328af1183a52881e425a3c55ef6571f9398c3a9de0c38a411eac4d66ce370dd5f38f4c0c86cf6c05e123761938c50405a9249527d8c33a1057b922fa66111b267fc088538b0e2350a22ecd1ce92f9a62650b3208d0596bd9c542e46d30f9d24cd7cb70ed7fe0063d4407fd76af163053d7b765cb7a044ff6da02af47fb0a9f2ea22f5b12667827a9eed89f11390fbb2140551adf07421d0f711a908c301ee06778670e43fffda0aeea4b4f50992e6e62b32ecdb359a292ce822515700281fbf5e3cdb3296bdbbf6eccae86c921c0da303f440546bb6f01b533d530d78b8a69d6ac72f031552e3350d5bbb12047cfa7117adea87412eec35ad56a527498c9bb3a936903873d8f9c272b4b1277d11a37a92ffd51f5dceba255c18225e261f466650eb1a401fe843a3cad8c4444bd7426139ffd720792153cff80c47feb277a6bd84b9e6ec93df3906ecfe2cb97fa4544e198ba779002866d980cea1ad3af965f5489edc4d931919bea1f729df21cbbb537381644cda8e871f4fd9da9930b38893f4cf1e53cedf8b6b507f15955ff63247cdd788f27077b003e77b1b704429b52837575d9df170aabcad76f855143e017fa172b4633ceaf9828938a199408ff5a5d2fa8a95bdab1e4484d2982ed7be008d7719cc0b6a7a928e01211b1565e8e63f32182a040bf38f2b81671f53c2887a644c4dae56c7cbbde625de7cb8d38c4765b2f2c102181a083a78e495da7f6a96185c56cf77ddd76dc4c89c5761b633b22000ad49753ae389d348d1284e19d10d14849da5c892b88a1b60e3a8b5a9d0273c18614816ccafd7365931b1bf1cc158a83012aa8fb270330fa7e687a6df98e6a777c89d2a1e29a94afe2493ffa49219f98e0c48ba59ccbe2aa965cd96c291a91a8b68422db8d14ee532863a6e2681f4e2263e219ce0018091e7e3aebbf770a89943d55cc0a253adbb26d44de9023dd0dc79ea77eba2872e4611dcbdcc65b163cffb58818c613d4dcdc209100c8aa49533204857413501aa8be4aec717de80b0ebaf6ccaf372edf5307c8b132fa5619afa4583c61b782dc3873d2a6fe254b18ef2eabc32ee55a2d6ab8bd9d4864aba7273989ecef69d4146f05cc93b95039f2af4553888653598ce5a8eb108ea7dc3d7b6144101b42b2bfedc109cdfa006bf6f77dbb4a0ba1a75ed98771bf6ad32a4413fe902e88a44b8e5848dff59fb4cb77502dfc14a1e68ab32a5c4580e05b7831378a64ce8faf8d84f06632182ba1feaf869e4a84d67a39c7088026daa196d04f3e2196389bb4f0ca047f17985ede6cd3e789b0c2bb57b1a086d8f139c2d604bbfc225ea4e5de8082c2d89c78187e36833197a55370b05bb45cf3d3bbbde982005d75160a45c1ae85d9da79da340bf133789023f9c2521c16cfb0bfa44270d11c77dc2375f3b6a23f0ddac97fb57585b8ad151a220b78b22e971fd3580832156302f659f206fd94f2460e42d731416405f446d22338ba2bc86cbc3f4f71353042ca10d2143f2e0c727cf7ca9c66ed3630309ce3f450ca7bb57804430efa2298124bbc58a0a6886d75c1376f4d4ca397909f332aa0501a44cf25d6822dad966e2d0d259ae3827f5d670fb411cb9c4386aa31326f0c123de81ac98d88c6f9b8c2cfe7c078a71df202eb8d06cab2254ea95410b436279556b2642fa79a339a1ae3f766f8a459cdd26af2ab05417ba7cc646f2368bc2146d8792532a511dc7251afc61c126c31091d8c3e6ee350bd17e6f413b903f938e5d2d69ce9023e20ccac1b3f55ec824dc7d27a25253debab53b97b5aa0b531ff8028e17de17b1f981fd95283703bcc98ec33eb968fa4dba02e53585252c88e72b81ad261de669f439feb9ac73808dc564698d4d476b7a8b0bd69304efdb0ed814b6dfd5f8a35a8fd96ccf6d5e488d945abd396b4394abb3134453b7740e78f778600a5c83e8ed4a7b1f84abeca19200a1a342eb3d4f27a4b7dd7890d7250ae1146dc0c330feac490636881020b75528a4ed4fdc5ebd34b72c765bfba4da31a7448b540ec630ec635855f82cd52a0e2becbd0e51abd0f9d29e865824425530d56304895854ee08621c72ffd9bf988373bc0c46d698b74bd4d7e60f1266466a732ab42e484ce85ce0253e82622354f4c84fdd69ceb0c00aa9cff297002c906af3da5897300fe1677be816865777cff5a27ce00aba4567df32816465c842b259f3d5937f8488a63508999a063a5c768d2d43456a0ac4c5840d34f811f03576c029eb862afa485365beb219e75b82b2126e137fd9d0b2a43b55e731c7593fb0ebad4ce5df23dc41ca2b37349a84e7daae996651af2ebc6715615f915fe4f05ac4c68c445fc9b701441eb70be1a432e5474ed4f435e793ada872b7d99a8b19eff79a344ca8a65da2ed245956f87fb66a653c10ca63b1213c24c02e92cf022008d5142c910901af13f3d3ab056929f79b0469fd59dbf954950bc22755dca2ede68845979a8ef26e7143bb6f64130e8f6ed0dc524be2e619b9947f340fd4c46e66b76d1ebb04acc82963444a7e320d6fb7d607d00007c2e063f821f7ae5d798d0392090f04735ee59785a6589c61c78a68756985ad576573beb2078608db41cb9c0a1b8a71af389be8a790d7f6ac074efd9a9da713287c4d270d1bfa4ace9266d5d10a70a197b7e8639ebc537d5aff5dfb7a79718b9e481d29fbcc116cbac0b070c1da1b1378cd15265c4e5f183dd3657e2029301991a734318c50f54b0fd17f41bd5c04b4ca2d8bed3c81df8747f8d3a78451586eb8eb3a08560168ad0d6c8e2f61dd9c1a27e6990e87a0dfb23ebca3b20877b76f7c4750d6b8abb12496404e017d18d6be1d0bf800df12f9af66fd5a420e2d32e677ecb0a3297031cb5fb7e9c0151467a759a817051cedd42d3baaee7d92a32a2d0caf7cc2fc02caa3a374639f8d3a0c5a595cb1e9c61594f6871c1211764e1656da0b15306b5c8d68aec80df5dba01eb3f5a34ed09ed746096bfe96bf655af9f43f5ff9a59177836ff6d897b9f174f63f43385eb5a3f53181a146625c784eeb7b5cdc1fc7962021b9469cb2b6ef4f0df01027ef5332956618a617363e9d0420851e3c92993390477109734926a80baf5b13dafa9af03f69dca7918392afd0dbde857cd1c64324b3a7e186a9be54d0363792942c05348d350331f5473cc8c82f4c49e44eae6fe6323f972f16687994bb1738344895f56fb692c8c9259650510c0ca5b0b9a07397ec933a80ed51dd437ada8dd48f9dc782c6294a15214efc25dfcb587ae53cc64a7fa32f5bb2c491be35342ebbc36f95a80733cc9a0f67088b93e754adf2bcabed6b709975039b560ee9a449497d59ebdbc1a0763e36ddd12deb009a0e5de24fd3e71aceda654d2c8415fea008895ce9dcf6b57d65906ec1c174fe01249b57d79ba38efa2f49f46587525ed94173a46eeebc8280d004282074fd655583e6a15ab99d425a72b3415a2875cfbeba253a2a0b87f3785871e4c34f1ed7d8610208b5ea89386f0d67549d1f7272966de06f8396a10ea73e822338c65cd580afbe28d245f9f0c3e2650816e3dca8195f0aaafdcfff7013fdad3791a9ae4cbe6d65d4e5eabac664480ae3f25506d739319df522521f338c0d2771a335b133c5c7dde59f3030d396d845832c994006b1f1896cdca6fdbe5fd30eba3b492eb17b7f927c1a47cc9e741b9c8d7fdf49b0f34cadd2cea59dd26ef4b711c988f46191f9eca6c91da620585fff4cf239d444a9b11479cf230023c4bc57f7f156b121ad1ccb865fb4809a29e0051da8cd1cce5ab20d626d6b922bab0c40c0427cde2c6aef72df01fb566a4b8dc6e0c83f28f308a3538479a0c30941f031189b531cb52eb760b6b2ad7a7dcc10116259b98e620f3616a5fee66b2a7ed16adfa2899ace4fb5357790a44fe7ab59f5717345b66cfd6f03f0bd395ea007fa20020d3769fbe5acf93e3b444108e35d2355424004c127b90755134ec76158e7dbb9b4ce338b540bf7e01ad5fa00ba35cc7c42d96d43c7f2cd1172d53361c9dd150d4c5be689eb00a0f9530ee695ed763b874ff66167e6c31487ebd1da95679ab1ecdf8cebef61aced2169ba38d7525b459454446381362097b3298f46f1367aadfb72d2042cbf8feedbc44ec72f7e7680e9b6268bdfdd718c602e66e84d3439470ea93cb4717b4c6fb950d8dc2ba0aea896ce2c202775e8485ebac29bcda9816b980db440c2026685a35860bb91e4a63e5e9cb051bcbeb8144a93a962f7e35c7ed324ceb78f87ab8dee40a275665ac8c5cf67f4e87410c25aa3664c27d0b8b08116e670aa0bf0e3115eaa5b7bb812ba3b7a2b830627b60ae62349c237b9605541e6a56118dc2329c2bc409d86366fbf3b79d92640c9f9357b7a77bce4a13f3c5904429eafedf3851a9f576cc5f7442ee52cf1290400e8f5aa9dc9527ef9929badcc31fd431fd44b97f972a6973ede717da341e5632520fea20f7489edc5e579cde8ca06772949130536e45963ddca7bfed995b2d8b61e49fcca81c20c26028d31bc33e5d8065e6feda6a7fb055c68d1c6c7edf2eca7bd291e3d5eedaa4a1f58bf711fc38db220618e117b61e2f42ca8cd5dd2e1f8e97416e054c65883804e3b9d30b54ed2ffd9893e73fe13438cd7e97a26a0419c1242940efa59d2cd20739a89084c4521526382a15b9ebdb7725d7f9049550e63b3af44688aff6d64bca944d3d6ce473935df16c199d0c44004c972b89ba033c428133acec0a3abc80507da9fde0274f58f7e2eac0b1fc7a38ffa35adcc4af80aac5df776d7d8b50cccf16531f3635a24e9ace234e6e10a5a6256b5f0f00d35bf6ad9dca1ab473a08f025b92b31717571b83017dfbce56e8aa7fbb1f50fc2374a3e1b1725780b18bb2cbadf894a357b3cc3b6be424fd96757fa9d3e1481b2944cbec973f7d97881906cf61abea653d9e14e53ab4a88f897c4fda665ed14b58245c4d2b715b7a0c253196fdaa4402fd60eb87962f1a4a38d8802f7ce255457402daf7165ea6ddae76078c61ff7236254b2175eb14e5ed336fe6ecf1b3158346c6c963aace05c1e3a8a60f4c9179dfd96d1651a34e7c0ebbafe4862e7a270872003f7edf360544233bc24604845dc6958c34bd4a1280f6219"}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f00000016c0)=ANY=[@ANYBLOB="b702000014200000bfa300000000000007030000b8feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000002014009500000000000000e3a33ba0daf208000000e17a606fe530cb7d7f852b315f933eda4cba189f181867514fe6007700dd90123d3ee7cfbe0000000000000000fbdfd43307cd29a4ca6be614c20594f72cbf5fe31789e70233bfd8115efd90c8c48258f896702e16cf8db9068a9e0000000000000000000000000000000000f0ff01420efca6785deb269d0a91985602763e4d70c404da006a3d6eef8fb7fcdd82eb1e9f5eb71e4df68814ab8242a5588437ea8ac76510bac458662e2bfd0cc817ba81cb4a3ef041f64f22d70240f82a78894b036baa4d15df64ae01130f26069d2a013dff7f74ac5dbce618e879b5c13f1f6cccaec453be2a520b12a99b20ab3dc2a700ff07000045cc215e1faa47db10278339b2d6bb4b60070200bc4bdad060a99e0a08e6fda3ade951df3ef7ca9c73286efe15c9effe55d57a5ea0b3d29b3cd96c7547a9f10d94fdb50960a5348c9d30cdbb4b7268d8efbce9e2cbb65c4c32113af7ff5b12def5af4688d2cb1804fb7d4cb0c3f291156f0000c01acf9c61d3935e912be628c975c164439875d3b688974387faa035f6a4dd48e5e9973f0c537a2190590241eba8514dea780e372a18f6ff7ddb674f807eb3c20300000062140d12f607992e978d511edc2f960a2c81efdd3953c4fe5a8ac4195d2d28de491d671f472be470f06960ddde2d4ab5593df9ee0d97c10689f7a40080d14535684063ec35028dc4b442869f61abe1a91b8c81000000d27a9b4a11ad3abb9e6e24e522c2a6203187de8e587d4dd67b490550f1a9782d5e37a13a75b4b4eba291d2161f37b9c9d6c219ef8be0c6f411153e4e7e1653b705b21db96ec01018ef51dfb744bba5e9ee736a1bf0861e2efa523c7142342e07824168fcb8428940e91c52eb27f56e2d14231ff78adf790b7cb5897776ac97aea9c5b4837a6b9338c43002006a25c03c6fee000047e813e3762571fff6f2abbbc327378036bb0fc0e727c4bbc3d1155f28a23afc2dde1ff2363d8c1bf6bdb6329583d41920d726e03fc4fe0eafe910294e9831d33b073ce672ac2a2eed8524b52acac12486f2beb4bdc4ac1cccd9df98801888427fbd3cdb10d6c00c6de69550e2e2c58241a1d67e2923966f707c579751c307743b6266eb6b9c4dac29e35f6d66844f2fe4867e96cb66ede30e0b65b4b9ac7984d60887f1e518afe12fd91b463ee994a43eb85fd9a3f9cec8ee4efa8ffa50e2e5d7007b26065cf97c460f0f069fa7a970f9b50899192f4b9dd59662be386e89d4692a2506115b0687fdfb128fa91a3461e9943d763f2387cc3468677f23a75356f7907fac57f6c2b32cba1c7a7ba48b5bef3336687b22668641a70ee67f21d2e9874ba9eae4889b7f6e2bca56de94586639a4f99d732a8f9b36df9aca67032f4d7a5f79fca8a0df6aa94dc36f6f9c259a09516aede2a6afc1b773bf4900507ee5528aa026076b1725ae748330ee3d6f0acb49fb69e37439512f37194cccc37a96539cc4e26a2a157f444cc879a20cf3947406891401dd7bca261ad7d62b06000000000000006857423a04b8941c2cac2152d2a4ce3287a20698cd00000000000000000092e5186ca7c98d58dbf3827d457710eca15ad7dfd39a420ebf57d9f58aece1c3ea6181348dacdad28421cdcaea8589b3653da1d719234088580d2f89a706f3bb9c14fc49d482953f0029e202b97786c52986e3e513ff61c9ebfd8820a0dc03e67810672b67766eb7cd1af51834ad82a18bb5fa17e0810a12eb22f44e110a6915f27d0073a9211f0566c63a9b6811771ae5d9c47bc7989a5d14af270de628521553ad8e1efdc3d5cfd9a374258ee88f768fe31117749a27f97140eda516c4adb15366d19009ca4222eb0d7c06b7c4d5343c5e9cb821e18acf98e03954cb27ca09135bfc01ff2499f89289872ee9c70522d072000000000051643281c8fe41d264d09d34392ee10345c1e0e3834c3c39a38273f20788e29c2b236f094131b18b2942a0ae23546ed6f00fe4cb79e84974fc269234e5b220a3480e391a5411dce226be452240d4cb31cdbdb4b630b4d57de8521d9c563887170014e66695b630b9d5e8dfaa9dfbd89be230fd514d3eb5feadce8a8fd0b0c94759922cd24537fe40aa6c0e25947be7667655496e0d79f1c953cbe114860ffdfff80cb9975346c53e4cda85db5fa40f186cecc1a0126bfa4cb50b700bfdb07121ceb18569f660da682f8737f196092b492aee5dbe43fb5928f61b4fe5c9035efc212163cf1553d31fda07709804461e67d6cb9cc06b2060a2aded115ceb1aa2b6a414401f21e4ba63730000000092e18d8b05594f8ebbff784637d057f812764a6e7ce3d5eee3936e35fecc9cf12351c704edfffe9489e6486ac9002954832f3d4da440361b83684dbb7c6c481515216c9c8ad6f0f1f3c104f9232f464f038713a0dda1706f6b7fc6c1b05a4e1506fe30ce5ae892160785a48bf408cde21de4205e4b473ee08ecf5aef024e4952fa5506ba014790ac6373b2f0da4795f739f77e65573cb85a72c487d67d03d7c9207b524eea9f205d2da6b35a760ab1b69c39abcbe38af3e21fae584469cc702e4d2ea51fa7117bcb1615b376f48762a1bb54dfc568858200"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="5cdd3086ddffff6633c9bbac88a8", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 19:16:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:44 executing program 2: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x12) 19:16:44 executing program 5: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000006) [ 745.825200][T19076] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=[@rights={{0x10, 0x2}}], 0x10}, 0x0) 19:16:44 executing program 0: timerfd_settime(0xffffffffffffffff, 0xbbf36dae489ceaca, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) [ 746.079647][T19112] 8021q: adding VLAN 0 to HW filter on device bond69 [ 746.095369][T19112] bond0: (slave bond69): Enslaving as an active interface with an up link 19:16:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000080)="27ce71896147440283", 0x9, 0x6}, {0x0, 0x0, 0x1162}], 0x0, &(0x7f0000000700)) 19:16:45 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0xb) 19:16:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000056740)={0x0, 0x0, "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", "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"}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f00000016c0)=ANY=[@ANYBLOB="b702000014200000bfa300000000000007030000b8feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000002014009500000000000000e3a33ba0daf208000000e17a606fe530cb7d7f852b315f933eda4cba189f181867514fe6007700dd90123d3ee7cfbe0000000000000000fbdfd43307cd29a4ca6be614c20594f72cbf5fe31789e70233bfd8115efd90c8c48258f896702e16cf8db9068a9e0000000000000000000000000000000000f0ff01420efca6785deb269d0a91985602763e4d70c404da006a3d6eef8fb7fcdd82eb1e9f5eb71e4df68814ab8242a5588437ea8ac76510bac458662e2bfd0cc817ba81cb4a3ef041f64f22d70240f82a78894b036baa4d15df64ae01130f26069d2a013dff7f74ac5dbce618e879b5c13f1f6cccaec453be2a520b12a99b20ab3dc2a700ff07000045cc215e1faa47db10278339b2d6bb4b60070200bc4bdad060a99e0a08e6fda3ade951df3ef7ca9c73286efe15c9effe55d57a5ea0b3d29b3cd96c7547a9f10d94fdb50960a5348c9d30cdbb4b7268d8efbce9e2cbb65c4c32113af7ff5b12def5af4688d2cb1804fb7d4cb0c3f291156f0000c01acf9c61d3935e912be628c975c164439875d3b688974387faa035f6a4dd48e5e9973f0c537a2190590241eba8514dea780e372a18f6ff7ddb674f807eb3c20300000062140d12f607992e978d511edc2f960a2c81efdd3953c4fe5a8ac4195d2d28de491d671f472be470f06960ddde2d4ab5593df9ee0d97c10689f7a40080d14535684063ec35028dc4b442869f61abe1a91b8c81000000d27a9b4a11ad3abb9e6e24e522c2a6203187de8e587d4dd67b490550f1a9782d5e37a13a75b4b4eba291d2161f37b9c9d6c219ef8be0c6f411153e4e7e1653b705b21db96ec01018ef51dfb744bba5e9ee736a1bf0861e2efa523c7142342e07824168fcb8428940e91c52eb27f56e2d14231ff78adf790b7cb5897776ac97aea9c5b4837a6b9338c43002006a25c03c6fee000047e813e3762571fff6f2abbbc327378036bb0fc0e727c4bbc3d1155f28a23afc2dde1ff2363d8c1bf6bdb6329583d41920d726e03fc4fe0eafe910294e9831d33b073ce672ac2a2eed8524b52acac12486f2beb4bdc4ac1cccd9df98801888427fbd3cdb10d6c00c6de69550e2e2c58241a1d67e2923966f707c579751c307743b6266eb6b9c4dac29e35f6d66844f2fe4867e96cb66ede30e0b65b4b9ac7984d60887f1e518afe12fd91b463ee994a43eb85fd9a3f9cec8ee4efa8ffa50e2e5d7007b26065cf97c460f0f069fa7a970f9b50899192f4b9dd59662be386e89d4692a2506115b0687fdfb128fa91a3461e9943d763f2387cc3468677f23a75356f7907fac57f6c2b32cba1c7a7ba48b5bef3336687b22668641a70ee67f21d2e9874ba9eae4889b7f6e2bca56de94586639a4f99d732a8f9b36df9aca67032f4d7a5f79fca8a0df6aa94dc36f6f9c259a09516aede2a6afc1b773bf4900507ee5528aa026076b1725ae748330ee3d6f0acb49fb69e37439512f37194cccc37a96539cc4e26a2a157f444cc879a20cf3947406891401dd7bca261ad7d62b06000000000000006857423a04b8941c2cac2152d2a4ce3287a20698cd00000000000000000092e5186ca7c98d58dbf3827d457710eca15ad7dfd39a420ebf57d9f58aece1c3ea6181348dacdad28421cdcaea8589b3653da1d719234088580d2f89a706f3bb9c14fc49d482953f0029e202b97786c52986e3e513ff61c9ebfd8820a0dc03e67810672b67766eb7cd1af51834ad82a18bb5fa17e0810a12eb22f44e110a6915f27d0073a9211f0566c63a9b6811771ae5d9c47bc7989a5d14af270de628521553ad8e1efdc3d5cfd9a374258ee88f768fe31117749a27f97140eda516c4adb15366d19009ca4222eb0d7c06b7c4d5343c5e9cb821e18acf98e03954cb27ca09135bfc01ff2499f89289872ee9c70522d072000000000051643281c8fe41d264d09d34392ee10345c1e0e3834c3c39a38273f20788e29c2b236f094131b18b2942a0ae23546ed6f00fe4cb79e84974fc269234e5b220a3480e391a5411dce226be452240d4cb31cdbdb4b630b4d57de8521d9c563887170014e66695b630b9d5e8dfaa9dfbd89be230fd514d3eb5feadce8a8fd0b0c94759922cd24537fe40aa6c0e25947be7667655496e0d79f1c953cbe114860ffdfff80cb9975346c53e4cda85db5fa40f186cecc1a0126bfa4cb50b700bfdb07121ceb18569f660da682f8737f196092b492aee5dbe43fb5928f61b4fe5c9035efc212163cf1553d31fda07709804461e67d6cb9cc06b2060a2aded115ceb1aa2b6a414401f21e4ba63730000000092e18d8b05594f8ebbff784637d057f812764a6e7ce3d5eee3936e35fecc9cf12351c704edfffe9489e6486ac9002954832f3d4da440361b83684dbb7c6c481515216c9c8ad6f0f1f3c104f9232f464f038713a0dda1706f6b7fc6c1b05a4e1506fe30ce5ae892160785a48bf408cde21de4205e4b473ee08ecf5aef024e4952fa5506ba014790ac6373b2f0da4795f739f77e65573cb85a72c487d67d03d7c9207b524eea9f205d2da6b35a760ab1b69c39abcbe38af3e21fae584469cc702e4d2ea51fa7117bcb1615b376f48762a1bb54dfc568858200"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000300)="5cdd3086ddffff6633c9bbac88a8", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 19:16:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:45 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) 19:16:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000001540)={0x4}) [ 747.028787][T19126] loop2: detected capacity change from 0 to 17 19:16:45 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x2c}}, 0x0) [ 747.141119][T19126] FAT-fs (loop2): bogus number of FAT structure [ 747.148598][T19126] FAT-fs (loop2): Can't find a valid FAT filesystem [ 747.320622][T19134] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:46 executing program 2: r0 = socket(0x11, 0x3, 0x0) ioctl$EVIOCGBITSND(r0, 0x8982, 0x0) [ 747.609183][T19173] 8021q: adding VLAN 0 to HW filter on device bond70 [ 747.624779][T19173] bond0: (slave bond70): Enslaving as an active interface with an up link 19:16:46 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x38, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}]}]}, 0x38}}, 0x0) 19:16:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 19:16:46 executing program 5: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040), r0) 19:16:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:46 executing program 3: clock_gettime(0x62d678518cc3173, 0x0) 19:16:47 executing program 2: syz_io_uring_setup(0x4f4d, &(0x7f0000001440)={0x0, 0xb1dc}, &(0x7f0000fd8000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3) 19:16:47 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x20, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) [ 748.619604][T19193] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:47 executing program 4: r0 = socket(0x11, 0x3, 0x0) r1 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)={0x6000001e}) 19:16:47 executing program 5: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040), r0) [ 748.893951][T19193] 8021q: adding VLAN 0 to HW filter on device bond71 [ 748.909367][T19193] bond0: (slave bond71): Enslaving as an active interface with an up link 19:16:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() sendmsg$unix(r0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01, 0xee01}}}], 0x20}, 0x0) 19:16:48 executing program 0: r0 = socket(0x1, 0x3, 0x0) ioctl$EVIOCGBITSND(r0, 0x80108906, 0x0) 19:16:48 executing program 5: r0 = socket(0x28, 0x1, 0x0) connect$netlink(r0, 0x0, 0x0) 19:16:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf}, 0x0) 19:16:48 executing program 4: r0 = socket(0x11, 0x3, 0x0) ioctl$EVIOCGBITSND(r0, 0x8981, 0x0) 19:16:48 executing program 3: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@fat=@usefree}]}) [ 749.824713][T19255] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) [ 749.969907][T19260] 8021q: adding VLAN 0 to HW filter on device bond72 [ 749.985667][T19260] bond0: (slave bond72): Enslaving as an active interface with an up link 19:16:48 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) 19:16:48 executing program 5: setgroups(0x1, &(0x7f0000000180)=[0xffffffffffffffff]) 19:16:48 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) bind(r0, &(0x7f00000001c0)=@un=@file={0xa}, 0xa) 19:16:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 750.357362][T19298] FAT-fs (loop3): bogus number of reserved sectors [ 750.364531][T19298] FAT-fs (loop3): Can't find a valid FAT filesystem 19:16:49 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000b40)=@file={0x0, './file0/file0\x00'}, 0x10, 0x0, 0x0, &(0x7f0000001000)=[@cred, @rights], 0x40, 0xa}, 0x6) 19:16:49 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100), 0x0, 0x0, 0x0) 19:16:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) openat$vimc1(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) syz_open_dev$radio(&(0x7f0000000480), 0x0, 0x2) [ 750.760961][T19315] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x0) 19:16:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0x2000008c, &(0x7f0000000180)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 19:16:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) [ 751.144793][T19346] 8021q: adding VLAN 0 to HW filter on device bond73 [ 751.160627][T19346] bond0: (slave bond73): Enslaving as an active interface with an up link 19:16:50 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) 19:16:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={0x0}}, 0x0) 19:16:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r0) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), r0) 19:16:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000040)={0x0, 0x0, 0x3016, 0x5, 0x0, {0xc0ba}, 0x1}) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000080)=""/221) r1 = syz_open_dev$cec(0x0, 0x0, 0x2) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000001c0)={0x1, 0x0, {0x800}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200), 0x4100, 0x0) 19:16:50 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000100)='/dev/dri/card#\x00', &(0x7f0000000140)='./file0\x00', r1) 19:16:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x1) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000040)={0x8000, 0x0, 0x3016, 0x5, 0x0, {0xc0ba, 0x9}, 0x1}) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000080)=""/221) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f00000001c0)={0x1, 0x0, {0x800, 0x4, 0x0, 0xdc}}) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x4100, 0x0) [ 752.082584][T19371] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:50 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 19:16:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 752.355609][T19394] 8021q: adding VLAN 0 to HW filter on device bond74 [ 752.371504][T19394] bond0: (slave bond74): Enslaving as an active interface with an up link 19:16:51 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x4, 0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 19:16:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:51 executing program 4: syz_open_dev$dri(&(0x7f0000000200), 0x0, 0x10000) 19:16:51 executing program 5: syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), 0xffffffffffffffff) 19:16:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, {0xc0ba}}) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, 0x0) syz_open_dev$cec(0x0, 0x0, 0x2) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000240)={0x3, [0x0, 0x0, 0x0]}) 19:16:51 executing program 0: io_setup(0x53d, &(0x7f0000000040)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000340)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x0, r1, 0x0}]) [ 753.355310][T19449] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:52 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000840)={0x2020}, 0x2020) [ 753.534981][T19487] 8021q: adding VLAN 0 to HW filter on device bond75 [ 753.556572][T19487] bond0: (slave bond75): Enslaving as an active interface with an up link 19:16:52 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001700)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f0000001640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 19:16:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:52 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x80, 0x0, 0x0) 19:16:52 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) preadv(r0, &(0x7f00000003c0)=[{0x0}], 0x1, 0x0, 0x0) 19:16:53 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1001, 0x0, 0x0) [ 754.439755][T19504] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 754.657720][T19531] 8021q: adding VLAN 0 to HW filter on device bond76 [ 754.673453][T19531] bond0: (slave bond76): Enslaving as an active interface with an up link 19:16:53 executing program 2: syz_emit_ethernet(0x52, &(0x7f0000000040)={@multicast, @local, @void, {@ipv4={0x800, @tcp={{0xc, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x44, 0x4, 0x2d}, @generic={0x94, 0x4, '\t\v'}, @rr={0x7, 0xf, 0xb, [@empty, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @rr={0x7, 0x3}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 19:16:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x1) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000040)={0x0, 0x0, 0x3016, 0x5, 0x0, {0xc0ba, 0x9}, 0x1}) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000080)=""/221) syz_open_dev$cec(&(0x7f0000000180), 0x0, 0x2) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f00000001c0)={0x0, 0x0, {0x800, 0x4, 0x0, 0xdc}}) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x4100, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000240)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000500), 0x10) 19:16:53 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)=@abs, 0xa, 0x0, 0x4d}, 0x0) 19:16:53 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000100)={0x0, 0xfffffffffffffffe}, 0x10) 19:16:53 executing program 4: socketpair(0x21, 0x0, 0x4, 0x0) 19:16:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:54 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write(r1, &(0x7f0000000000)="ef", 0x1) poll(&(0x7f0000000040)=[{r0, 0x1}], 0x1, 0x0) 19:16:54 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:16:54 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x2) 19:16:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x6, &(0x7f0000000340)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000740)="ed5937", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000013200)="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", 0x281, 0x11580}], 0x0, &(0x7f00000000c0)) [ 755.675841][T19564] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:16:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x9, 0x6, 0xb9, 0x1, 0x0, 0x80000000, 0x19001, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x10004, 0xfc7, 0x3f, 0x7, 0x7, 0x6, 0xe2e, 0x0, 0x3ff, 0x0, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x1) bind(r0, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) socket(0x11, 0x800000003, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0xff, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="07268a927f1f6588b967481241ba78606a5cf65ac618ded8974895abeaf4b4834ff922b3f134b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) close(0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_RECV=@use_registered_buffer, 0x0) [ 756.079668][T19583] 8021q: adding VLAN 0 to HW filter on device bond77 [ 756.095660][T19583] bond0: (slave bond77): Enslaving as an active interface with an up link [ 756.302230][T19610] loop0: detected capacity change from 0 to 264192 19:16:55 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x24, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x9, 0x6, 0x0, 0x3, 0x0, 0x50000, 0x429, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x4, 0x7fffffff, 0x3, 0x5, 0x8, 0x101, 0x1, 0x0, 0xfffe0000, 0x0, 0x9}, 0x0, 0xc, r0, 0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x5, &(0x7f0000000400)=""/201, 0xc9}, 0x9}, {{&(0x7f0000001580)=@sco={0x1f, @none}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000001600)=""/123, 0x7b}, {&(0x7f0000001680)=""/187, 0xbb}, {&(0x7f0000001740)=""/94, 0x5e}, {&(0x7f00000017c0)=""/152, 0x98}], 0x5, &(0x7f0000001900)=""/181, 0xb5}, 0x9}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f00000019c0)=""/168, 0xa8}, {&(0x7f0000001a80)=""/54, 0x36}, {&(0x7f0000001ac0)=""/219, 0xdb}, {&(0x7f0000001bc0)=""/184, 0xb8}, {&(0x7f0000001c80)=""/114, 0x72}], 0x5, &(0x7f0000001d80)=""/150, 0x96}, 0x1}, {{&(0x7f0000001e40)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/149, 0x95}, {&(0x7f0000001f80)=""/215, 0xd7}], 0x2, &(0x7f00000020c0)=""/149, 0x95}, 0x40}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000002180)=""/42, 0x2a}], 0x1}, 0x9}, {{&(0x7f0000002200)=@generic, 0x80, &(0x7f0000003700)=[{&(0x7f0000002280)=""/90, 0x5a}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/195, 0xc3}, {&(0x7f0000003400)=""/224, 0xe0}, {&(0x7f0000003500)=""/129, 0x81}, {&(0x7f00000035c0)=""/35, 0x23}, {&(0x7f0000003600)=""/127, 0x7f}, {&(0x7f0000003680)=""/91, 0x5b}], 0x8, &(0x7f0000003780)=""/55, 0x37}, 0x80000001}, {{&(0x7f00000037c0)=@rc, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003840)=""/252, 0xfc}, {&(0x7f0000003940)=""/204, 0xcc}, {&(0x7f0000003a40)=""/225, 0xe1}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/25, 0x19}, {0x0}, {&(0x7f0000004c80)=""/213, 0xd5}], 0x7, &(0x7f0000004e00)=""/95, 0x5f}, 0x4}], 0x7, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffdcc) 19:16:55 executing program 3: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f00006bd000/0x1000)=nil, 0x1000, 0x0, 0x8011, r0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) clone3(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 756.451308][T19610] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 19:16:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:55 executing program 2: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f00006bd000/0x1000)=nil, 0x1000, 0x0, 0x8011, r0, 0xd4a60000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x80000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) [ 756.672509][T19610] EXT4-fs error (device loop0): ext4_orphan_get:1393: inode #17: comm syz-executor.0: iget: bogus i_mode (355) [ 756.777972][T19610] EXT4-fs error (device loop0): ext4_orphan_get:1398: comm syz-executor.0: couldn't read orphan inode 17 (err -117) [ 757.030378][T19610] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 19:16:56 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x183, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x10000}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f000014b000/0x2000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000080), 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, 0x0}, 0x8004) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r4, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x4000, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x4, @perf_bp={&(0x7f0000000480), 0xa}, 0x20400, 0x0, 0x400, 0x8, 0x2, 0x2, 0x3f, 0x0, 0x4}, 0xffffffffffffffff, 0x5, r3, 0x8) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x700) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_POLL_ADD, 0xff) [ 757.482384][T19630] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 757.668929][T19653] 8021q: adding VLAN 0 to HW filter on device bond78 [ 757.684555][T19653] bond0: (slave bond78): Enslaving as an active interface with an up link 19:16:56 executing program 4: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f00006bd000/0x1000)=nil, 0x1000, 0x0, 0x8011, r0, 0xd4a60000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) 19:16:56 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x24, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x9, 0x6, 0x0, 0x3, 0x0, 0x50000, 0x429, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x4, 0x7fffffff, 0x3, 0x5, 0x8, 0x101, 0x1, 0x0, 0xfffe0000, 0x0, 0x9}, 0x0, 0xc, r0, 0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x5, &(0x7f0000000400)=""/201, 0xc9}, 0x9}, {{&(0x7f0000001580)=@sco={0x1f, @none}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000001600)=""/123, 0x7b}, {&(0x7f0000001680)=""/187, 0xbb}, {&(0x7f0000001740)=""/94, 0x5e}, {&(0x7f00000017c0)=""/152, 0x98}], 0x5, &(0x7f0000001900)=""/181, 0xb5}, 0x9}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f00000019c0)=""/168, 0xa8}, {&(0x7f0000001a80)=""/54, 0x36}, {&(0x7f0000001ac0)=""/219, 0xdb}, {&(0x7f0000001bc0)=""/184, 0xb8}, {&(0x7f0000001c80)=""/114, 0x72}], 0x5, &(0x7f0000001d80)=""/150, 0x96}, 0x1}, {{&(0x7f0000001e40)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/149, 0x95}, {&(0x7f0000001f80)=""/215, 0xd7}], 0x2, &(0x7f00000020c0)=""/149, 0x95}, 0x40}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000002180)=""/42, 0x2a}], 0x1}, 0x9}, {{&(0x7f0000002200)=@generic, 0x80, &(0x7f0000003700)=[{&(0x7f0000002280)=""/90, 0x5a}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/195, 0xc3}, {&(0x7f0000003400)=""/224, 0xe0}, {&(0x7f0000003500)=""/129, 0x81}, {&(0x7f00000035c0)=""/35, 0x23}, {&(0x7f0000003600)=""/127, 0x7f}, {&(0x7f0000003680)=""/91, 0x5b}], 0x8, &(0x7f0000003780)=""/55, 0x37}, 0x80000001}, {{&(0x7f00000037c0)=@rc, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003840)=""/252, 0xfc}, {&(0x7f0000003940)=""/204, 0xcc}, {&(0x7f0000003a40)=""/225, 0xe1}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/25, 0x19}, {0x0}, {&(0x7f0000004c80)=""/213, 0xd5}], 0x7, &(0x7f0000004e00)=""/95, 0x5f}, 0x4}], 0x7, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffdcc) 19:16:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:57 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x24, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x9, 0x6, 0x0, 0x3, 0x0, 0x50000, 0x429, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x4, 0x7fffffff, 0x3, 0x5, 0x8, 0x101, 0x1, 0x0, 0xfffe0000, 0x0, 0x9}, 0x0, 0xc, r0, 0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x5, &(0x7f0000000400)=""/201, 0xc9}, 0x9}, {{&(0x7f0000001580)=@sco={0x1f, @none}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000001600)=""/123, 0x7b}, {&(0x7f0000001680)=""/187, 0xbb}, {&(0x7f0000001740)=""/94, 0x5e}, {&(0x7f00000017c0)=""/152, 0x98}], 0x5, &(0x7f0000001900)=""/181, 0xb5}, 0x9}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f00000019c0)=""/168, 0xa8}, {&(0x7f0000001a80)=""/54, 0x36}, {&(0x7f0000001ac0)=""/219, 0xdb}, {&(0x7f0000001bc0)=""/184, 0xb8}, {&(0x7f0000001c80)=""/114, 0x72}], 0x5, &(0x7f0000001d80)=""/150, 0x96}, 0x1}, {{&(0x7f0000001e40)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/149, 0x95}, {&(0x7f0000001f80)=""/215, 0xd7}], 0x2, &(0x7f00000020c0)=""/149, 0x95}, 0x40}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000002180)=""/42, 0x2a}], 0x1}, 0x9}, {{&(0x7f0000002200)=@generic, 0x80, &(0x7f0000003700)=[{&(0x7f0000002280)=""/90, 0x5a}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/195, 0xc3}, {&(0x7f0000003400)=""/224, 0xe0}, {&(0x7f0000003500)=""/129, 0x81}, {&(0x7f00000035c0)=""/35, 0x23}, {&(0x7f0000003600)=""/127, 0x7f}, {&(0x7f0000003680)=""/91, 0x5b}], 0x8, &(0x7f0000003780)=""/55, 0x37}, 0x80000001}, {{&(0x7f00000037c0)=@rc, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003840)=""/252, 0xfc}, {&(0x7f0000003940)=""/204, 0xcc}, {&(0x7f0000003a40)=""/225, 0xe1}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/25, 0x19}, {0x0}, {&(0x7f0000004c80)=""/213, 0xd5}], 0x7, &(0x7f0000004e00)=""/95, 0x5f}, 0x4}], 0x7, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffdcc) 19:16:57 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x24, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x9, 0x6, 0x0, 0x3, 0x0, 0x50000, 0x429, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x4, 0x7fffffff, 0x3, 0x5, 0x8, 0x101, 0x1, 0x0, 0xfffe0000, 0x0, 0x9}, 0x0, 0xc, r0, 0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x5, &(0x7f0000000400)=""/201, 0xc9}, 0x9}, {{&(0x7f0000001580)=@sco={0x1f, @none}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000001600)=""/123, 0x7b}, {&(0x7f0000001680)=""/187, 0xbb}, {&(0x7f0000001740)=""/94, 0x5e}, {&(0x7f00000017c0)=""/152, 0x98}], 0x5, &(0x7f0000001900)=""/181, 0xb5}, 0x9}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f00000019c0)=""/168, 0xa8}, {&(0x7f0000001a80)=""/54, 0x36}, {&(0x7f0000001ac0)=""/219, 0xdb}, {&(0x7f0000001bc0)=""/184, 0xb8}, {&(0x7f0000001c80)=""/114, 0x72}], 0x5, &(0x7f0000001d80)=""/150, 0x96}, 0x1}, {{&(0x7f0000001e40)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/149, 0x95}, {&(0x7f0000001f80)=""/215, 0xd7}], 0x2, &(0x7f00000020c0)=""/149, 0x95}, 0x40}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000002180)=""/42, 0x2a}], 0x1}, 0x9}, {{&(0x7f0000002200)=@generic, 0x80, &(0x7f0000003700)=[{&(0x7f0000002280)=""/90, 0x5a}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/195, 0xc3}, {&(0x7f0000003400)=""/224, 0xe0}, {&(0x7f0000003500)=""/129, 0x81}, {&(0x7f00000035c0)=""/35, 0x23}, {&(0x7f0000003600)=""/127, 0x7f}, {&(0x7f0000003680)=""/91, 0x5b}], 0x8, &(0x7f0000003780)=""/55, 0x37}, 0x80000001}, {{&(0x7f00000037c0)=@rc, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003840)=""/252, 0xfc}, {&(0x7f0000003940)=""/204, 0xcc}, {&(0x7f0000003a40)=""/225, 0xe1}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/25, 0x19}, {0x0}, {&(0x7f0000004c80)=""/213, 0xd5}], 0x7, &(0x7f0000004e00)=""/95, 0x5f}, 0x4}], 0x7, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffdcc) 19:16:58 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x183, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x10000}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f000014b000/0x2000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000080), 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, 0x0}, 0x8004) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r4, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x4000, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x4, @perf_bp={&(0x7f0000000480), 0xa}, 0x20400, 0x0, 0x400, 0x8, 0x2, 0x2, 0x3f, 0x0, 0x4}, 0xffffffffffffffff, 0x5, r3, 0x8) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x700) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_POLL_ADD, 0xff) [ 759.826449][T19688] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 760.092212][T19717] 8021q: adding VLAN 0 to HW filter on device bond79 [ 760.109260][T19717] bond0: (slave bond79): Enslaving as an active interface with an up link 19:16:58 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x24, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x9, 0x6, 0x0, 0x3, 0x0, 0x50000, 0x429, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x4, 0x7fffffff, 0x3, 0x5, 0x8, 0x101, 0x1, 0x0, 0xfffe0000, 0x0, 0x9}, 0x0, 0xc, r0, 0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x5, &(0x7f0000000400)=""/201, 0xc9}, 0x9}, {{&(0x7f0000001580)=@sco={0x1f, @none}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000001600)=""/123, 0x7b}, {&(0x7f0000001680)=""/187, 0xbb}, {&(0x7f0000001740)=""/94, 0x5e}, {&(0x7f00000017c0)=""/152, 0x98}], 0x5, &(0x7f0000001900)=""/181, 0xb5}, 0x9}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f00000019c0)=""/168, 0xa8}, {&(0x7f0000001a80)=""/54, 0x36}, {&(0x7f0000001ac0)=""/219, 0xdb}, {&(0x7f0000001bc0)=""/184, 0xb8}, {&(0x7f0000001c80)=""/114, 0x72}], 0x5, &(0x7f0000001d80)=""/150, 0x96}, 0x1}, {{&(0x7f0000001e40)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/149, 0x95}, {&(0x7f0000001f80)=""/215, 0xd7}], 0x2, &(0x7f00000020c0)=""/149, 0x95}, 0x40}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000002180)=""/42, 0x2a}], 0x1}, 0x9}, {{&(0x7f0000002200)=@generic, 0x80, &(0x7f0000003700)=[{&(0x7f0000002280)=""/90, 0x5a}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/195, 0xc3}, {&(0x7f0000003400)=""/224, 0xe0}, {&(0x7f0000003500)=""/129, 0x81}, {&(0x7f00000035c0)=""/35, 0x23}, {&(0x7f0000003600)=""/127, 0x7f}, {&(0x7f0000003680)=""/91, 0x5b}], 0x8, &(0x7f0000003780)=""/55, 0x37}, 0x80000001}, {{&(0x7f00000037c0)=@rc, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003840)=""/252, 0xfc}, {&(0x7f0000003940)=""/204, 0xcc}, {&(0x7f0000003a40)=""/225, 0xe1}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/25, 0x19}, {0x0}, {&(0x7f0000004c80)=""/213, 0xd5}], 0x7, &(0x7f0000004e00)=""/95, 0x5f}, 0x4}], 0x7, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffdcc) 19:16:59 executing program 2: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f00006bd000/0x1000)=nil, 0x1000, 0x0, 0x8011, r0, 0xd4a60000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x80000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) 19:16:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:16:59 executing program 4: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f00006bd000/0x1000)=nil, 0x1000, 0x0, 0x8011, r0, 0xd4a60000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) [ 760.751586][ T1199] ieee802154 phy0 wpan0: encryption failed: -22 [ 760.758284][ T1199] ieee802154 phy1 wpan1: encryption failed: -22 19:16:59 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x24, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x9, 0x6, 0x0, 0x3, 0x0, 0x50000, 0x429, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x4, 0x7fffffff, 0x3, 0x5, 0x8, 0x101, 0x1, 0x0, 0xfffe0000, 0x0, 0x9}, 0x0, 0xc, r0, 0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x5, &(0x7f0000000400)=""/201, 0xc9}, 0x9}, {{&(0x7f0000001580)=@sco={0x1f, @none}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000001600)=""/123, 0x7b}, {&(0x7f0000001680)=""/187, 0xbb}, {&(0x7f0000001740)=""/94, 0x5e}, {&(0x7f00000017c0)=""/152, 0x98}], 0x5, &(0x7f0000001900)=""/181, 0xb5}, 0x9}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f00000019c0)=""/168, 0xa8}, {&(0x7f0000001a80)=""/54, 0x36}, {&(0x7f0000001ac0)=""/219, 0xdb}, {&(0x7f0000001bc0)=""/184, 0xb8}, {&(0x7f0000001c80)=""/114, 0x72}], 0x5, &(0x7f0000001d80)=""/150, 0x96}, 0x1}, {{&(0x7f0000001e40)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/149, 0x95}, {&(0x7f0000001f80)=""/215, 0xd7}], 0x2, &(0x7f00000020c0)=""/149, 0x95}, 0x40}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000002180)=""/42, 0x2a}], 0x1}, 0x9}, {{&(0x7f0000002200)=@generic, 0x80, &(0x7f0000003700)=[{&(0x7f0000002280)=""/90, 0x5a}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/195, 0xc3}, {&(0x7f0000003400)=""/224, 0xe0}, {&(0x7f0000003500)=""/129, 0x81}, {&(0x7f00000035c0)=""/35, 0x23}, {&(0x7f0000003600)=""/127, 0x7f}, {&(0x7f0000003680)=""/91, 0x5b}], 0x8, &(0x7f0000003780)=""/55, 0x37}, 0x80000001}, {{&(0x7f00000037c0)=@rc, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003840)=""/252, 0xfc}, {&(0x7f0000003940)=""/204, 0xcc}, {&(0x7f0000003a40)=""/225, 0xe1}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/25, 0x19}, {0x0}, {&(0x7f0000004c80)=""/213, 0xd5}], 0x7, &(0x7f0000004e00)=""/95, 0x5f}, 0x4}], 0x7, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffdcc) [ 761.514145][T19743] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:00 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x183, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x10000}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f000014b000/0x2000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000080), 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, 0x0}, 0x8004) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r4, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x4000, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x4, @perf_bp={&(0x7f0000000480), 0xa}, 0x20400, 0x0, 0x400, 0x8, 0x2, 0x2, 0x3f, 0x0, 0x4}, 0xffffffffffffffff, 0x5, r3, 0x8) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x700) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_POLL_ADD, 0xff) 19:17:00 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x24, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x9, 0x6, 0x0, 0x3, 0x0, 0x50000, 0x429, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x4, 0x7fffffff, 0x3, 0x5, 0x8, 0x101, 0x1, 0x0, 0xfffe0000, 0x0, 0x9}, 0x0, 0xc, r0, 0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x5, &(0x7f0000000400)=""/201, 0xc9}, 0x9}, {{&(0x7f0000001580)=@sco={0x1f, @none}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000001600)=""/123, 0x7b}, {&(0x7f0000001680)=""/187, 0xbb}, {&(0x7f0000001740)=""/94, 0x5e}, {&(0x7f00000017c0)=""/152, 0x98}], 0x5, &(0x7f0000001900)=""/181, 0xb5}, 0x9}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f00000019c0)=""/168, 0xa8}, {&(0x7f0000001a80)=""/54, 0x36}, {&(0x7f0000001ac0)=""/219, 0xdb}, {&(0x7f0000001bc0)=""/184, 0xb8}, {&(0x7f0000001c80)=""/114, 0x72}], 0x5, &(0x7f0000001d80)=""/150, 0x96}, 0x1}, {{&(0x7f0000001e40)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/149, 0x95}, {&(0x7f0000001f80)=""/215, 0xd7}], 0x2, &(0x7f00000020c0)=""/149, 0x95}, 0x40}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000002180)=""/42, 0x2a}], 0x1}, 0x9}, {{&(0x7f0000002200)=@generic, 0x80, &(0x7f0000003700)=[{&(0x7f0000002280)=""/90, 0x5a}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/195, 0xc3}, {&(0x7f0000003400)=""/224, 0xe0}, {&(0x7f0000003500)=""/129, 0x81}, {&(0x7f00000035c0)=""/35, 0x23}, {&(0x7f0000003600)=""/127, 0x7f}, {&(0x7f0000003680)=""/91, 0x5b}], 0x8, &(0x7f0000003780)=""/55, 0x37}, 0x80000001}, {{&(0x7f00000037c0)=@rc, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003840)=""/252, 0xfc}, {&(0x7f0000003940)=""/204, 0xcc}, {&(0x7f0000003a40)=""/225, 0xe1}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/25, 0x19}, {0x0}, {&(0x7f0000004c80)=""/213, 0xd5}], 0x7, &(0x7f0000004e00)=""/95, 0x5f}, 0x4}], 0x7, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffdcc) 19:17:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:02 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x24, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x9, 0x6, 0x0, 0x3, 0x0, 0x50000, 0x429, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x4, 0x7fffffff, 0x3, 0x5, 0x8, 0x101, 0x1, 0x0, 0xfffe0000, 0x0, 0x9}, 0x0, 0xc, r0, 0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x5, &(0x7f0000000400)=""/201, 0xc9}, 0x9}, {{&(0x7f0000001580)=@sco={0x1f, @none}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000001600)=""/123, 0x7b}, {&(0x7f0000001680)=""/187, 0xbb}, {&(0x7f0000001740)=""/94, 0x5e}, {&(0x7f00000017c0)=""/152, 0x98}], 0x5, &(0x7f0000001900)=""/181, 0xb5}, 0x9}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f00000019c0)=""/168, 0xa8}, {&(0x7f0000001a80)=""/54, 0x36}, {&(0x7f0000001ac0)=""/219, 0xdb}, {&(0x7f0000001bc0)=""/184, 0xb8}, {&(0x7f0000001c80)=""/114, 0x72}], 0x5, &(0x7f0000001d80)=""/150, 0x96}, 0x1}, {{&(0x7f0000001e40)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/149, 0x95}, {&(0x7f0000001f80)=""/215, 0xd7}], 0x2, &(0x7f00000020c0)=""/149, 0x95}, 0x40}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000002180)=""/42, 0x2a}], 0x1}, 0x9}, {{&(0x7f0000002200)=@generic, 0x80, &(0x7f0000003700)=[{&(0x7f0000002280)=""/90, 0x5a}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/195, 0xc3}, {&(0x7f0000003400)=""/224, 0xe0}, {&(0x7f0000003500)=""/129, 0x81}, {&(0x7f00000035c0)=""/35, 0x23}, {&(0x7f0000003600)=""/127, 0x7f}, {&(0x7f0000003680)=""/91, 0x5b}], 0x8, &(0x7f0000003780)=""/55, 0x37}, 0x80000001}, {{&(0x7f00000037c0)=@rc, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003840)=""/252, 0xfc}, {&(0x7f0000003940)=""/204, 0xcc}, {&(0x7f0000003a40)=""/225, 0xe1}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/25, 0x19}, {0x0}, {&(0x7f0000004c80)=""/213, 0xd5}], 0x7, &(0x7f0000004e00)=""/95, 0x5f}, 0x4}], 0x7, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffdcc) 19:17:02 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x24, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x9, 0x6, 0x0, 0x3, 0x0, 0x50000, 0x429, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x4, 0x7fffffff, 0x3, 0x5, 0x8, 0x101, 0x1, 0x0, 0xfffe0000, 0x0, 0x9}, 0x0, 0xc, r0, 0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x5, &(0x7f0000000400)=""/201, 0xc9}, 0x9}, {{&(0x7f0000001580)=@sco={0x1f, @none}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000001600)=""/123, 0x7b}, {&(0x7f0000001680)=""/187, 0xbb}, {&(0x7f0000001740)=""/94, 0x5e}, {&(0x7f00000017c0)=""/152, 0x98}], 0x5, &(0x7f0000001900)=""/181, 0xb5}, 0x9}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f00000019c0)=""/168, 0xa8}, {&(0x7f0000001a80)=""/54, 0x36}, {&(0x7f0000001ac0)=""/219, 0xdb}, {&(0x7f0000001bc0)=""/184, 0xb8}, {&(0x7f0000001c80)=""/114, 0x72}], 0x5, &(0x7f0000001d80)=""/150, 0x96}, 0x1}, {{&(0x7f0000001e40)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/149, 0x95}, {&(0x7f0000001f80)=""/215, 0xd7}], 0x2, &(0x7f00000020c0)=""/149, 0x95}, 0x40}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000002180)=""/42, 0x2a}], 0x1}, 0x9}, {{&(0x7f0000002200)=@generic, 0x80, &(0x7f0000003700)=[{&(0x7f0000002280)=""/90, 0x5a}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/195, 0xc3}, {&(0x7f0000003400)=""/224, 0xe0}, {&(0x7f0000003500)=""/129, 0x81}, {&(0x7f00000035c0)=""/35, 0x23}, {&(0x7f0000003600)=""/127, 0x7f}, {&(0x7f0000003680)=""/91, 0x5b}], 0x8, &(0x7f0000003780)=""/55, 0x37}, 0x80000001}, {{&(0x7f00000037c0)=@rc, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003840)=""/252, 0xfc}, {&(0x7f0000003940)=""/204, 0xcc}, {&(0x7f0000003a40)=""/225, 0xe1}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/25, 0x19}, {0x0}, {&(0x7f0000004c80)=""/213, 0xd5}], 0x7, &(0x7f0000004e00)=""/95, 0x5f}, 0x4}], 0x7, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffdcc) 19:17:02 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000480)=0xc) setregid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYRESHEX], 0xd8, 0x4000000}, 0x8850) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0xa, &(0x7f0000000340)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f465", 0x43, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {0x0, 0x0, 0x6800}, {&(0x7f0000000740)="ed5937022539de3586222824", 0xc, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {0x0}, {&(0x7f0000013200), 0x0, 0x11580}], 0x0, &(0x7f00000000c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, @llc, 0x4, 0x0, 0x0, 0x0, 0x202}) [ 764.002992][T19801] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 764.286724][T19828] 8021q: adding VLAN 0 to HW filter on device bond81 [ 764.308241][T19828] bond0: (slave bond81): Enslaving as an active interface with an up link 19:17:03 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x183, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x10000}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f000014b000/0x2000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000080), 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, 0x0}, 0x8004) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r4, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x4000, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x4, @perf_bp={&(0x7f0000000480), 0xa}, 0x20400, 0x0, 0x400, 0x8, 0x2, 0x2, 0x3f, 0x0, 0x4}, 0xffffffffffffffff, 0x5, r3, 0x8) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x700) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_POLL_ADD, 0xff) 19:17:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:03 executing program 3: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x42000) 19:17:03 executing program 4: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f00006bd000/0x1000)=nil, 0x1000, 0x0, 0x8011, r0, 0xd4a60000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) [ 765.202368][T19849] loop2: detected capacity change from 0 to 264192 19:17:04 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x24, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x9, 0x6, 0x0, 0x3, 0x0, 0x50000, 0x429, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x4, 0x7fffffff, 0x3, 0x5, 0x8, 0x101, 0x1, 0x0, 0xfffe0000, 0x0, 0x9}, 0x0, 0xc, r0, 0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x5, &(0x7f0000000400)=""/201, 0xc9}, 0x9}, {{&(0x7f0000001580)=@sco={0x1f, @none}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000001600)=""/123, 0x7b}, {&(0x7f0000001680)=""/187, 0xbb}, {&(0x7f0000001740)=""/94, 0x5e}, {&(0x7f00000017c0)=""/152, 0x98}], 0x5, &(0x7f0000001900)=""/181, 0xb5}, 0x9}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f00000019c0)=""/168, 0xa8}, {&(0x7f0000001a80)=""/54, 0x36}, {&(0x7f0000001ac0)=""/219, 0xdb}, {&(0x7f0000001bc0)=""/184, 0xb8}, {&(0x7f0000001c80)=""/114, 0x72}], 0x5, &(0x7f0000001d80)=""/150, 0x96}, 0x1}, {{&(0x7f0000001e40)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/149, 0x95}, {&(0x7f0000001f80)=""/215, 0xd7}], 0x2, &(0x7f00000020c0)=""/149, 0x95}, 0x40}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000002180)=""/42, 0x2a}], 0x1}, 0x9}, {{&(0x7f0000002200)=@generic, 0x80, &(0x7f0000003700)=[{&(0x7f0000002280)=""/90, 0x5a}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/195, 0xc3}, {&(0x7f0000003400)=""/224, 0xe0}, {&(0x7f0000003500)=""/129, 0x81}, {&(0x7f00000035c0)=""/35, 0x23}, {&(0x7f0000003600)=""/127, 0x7f}, {&(0x7f0000003680)=""/91, 0x5b}], 0x8, &(0x7f0000003780)=""/55, 0x37}, 0x80000001}, {{&(0x7f00000037c0)=@rc, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003840)=""/252, 0xfc}, {&(0x7f0000003940)=""/204, 0xcc}, {&(0x7f0000003a40)=""/225, 0xe1}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/25, 0x19}, {0x0}, {&(0x7f0000004c80)=""/213, 0xd5}], 0x7, &(0x7f0000004e00)=""/95, 0x5f}, 0x4}], 0x7, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffdcc) [ 765.949451][T19849] EXT4-fs: failed to create workqueue [ 765.955387][T19849] EXT4-fs (loop2): mount failed [ 766.004225][T19858] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:05 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000480)=0xc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0xa, &(0x7f0000000340)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001", 0x3d, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {0x0, 0x0, 0x6800}, {&(0x7f0000000740)="ed5937", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {0x0, 0x0, 0x11100}, {&(0x7f0000013200), 0x0, 0x11580}], 0x0, &(0x7f00000000c0)) [ 766.369787][T19861] 8021q: adding VLAN 0 to HW filter on device bond82 [ 766.387326][T19861] bond0: (slave bond82): Enslaving as an active interface with an up link 19:17:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3760, 0x0, 0x0, 0xffd7, 0x0, "00000000283b0011"}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 19:17:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000002400)='./file0\x00', 0xff7ffffffffff000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) chdir(&(0x7f0000000180)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 19:17:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 766.932320][T19796] cron (19796) used greatest stack depth: 4000 bytes left 19:17:05 executing program 5: io_setup(0x6a1f, &(0x7f0000000040)) io_setup(0x0, 0x0) 19:17:06 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/166, 0xa6}], 0x1, &(0x7f0000001340)=[{&(0x7f000001a7c0)=""/102400, 0x19000}], 0x1, 0x0) [ 767.304239][T19913] loop2: detected capacity change from 0 to 264192 [ 767.431623][T19917] loop3: detected capacity change from 0 to 264192 [ 767.680323][ T24] audit: type=1800 audit(1639423026.370:35): pid=19925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14177 res=0 errno=0 19:17:06 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/uts\x00') pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r2 = dup(r1) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000000)) [ 767.818641][T19913] EXT4-fs error (device loop2): ext4_orphan_get:1398: comm syz-executor.2: couldn't read orphan inode 17 (err -116) [ 767.876455][T19913] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 19:17:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:06 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000480)=0xc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0xa, &(0x7f0000000340)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001", 0x3d, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {0x0, 0x0, 0x6800}, {&(0x7f0000000740)="ed5937", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {0x0, 0x0, 0x11100}, {&(0x7f0000013200), 0x0, 0x11580}], 0x0, &(0x7f00000000c0)) 19:17:06 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1e9281, 0x0) write$ppp(r0, 0x0, 0x0) 19:17:07 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/uts\x00') ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0x0, 0x3a15}) 19:17:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040), 0x4) [ 768.498218][T19941] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0x1f, 0x4) [ 768.709622][T19953] 8021q: adding VLAN 0 to HW filter on device bond83 [ 768.811930][T19953] bond0: (slave bond83): Enslaving as an active interface with an up link [ 768.866751][T19981] loop2: detected capacity change from 0 to 264192 19:17:07 executing program 5: select(0xffffffffffffff37, &(0x7f0000000040), 0x0, &(0x7f0000000000), &(0x7f0000000100)) 19:17:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 769.062641][T19981] EXT4-fs error (device loop2): ext4_orphan_get:1398: comm syz-executor.2: couldn't read orphan inode 17 (err -116) 19:17:07 executing program 0: io_setup(0x0, &(0x7f0000000080)) io_setup(0xffff, &(0x7f0000000100)) 19:17:07 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x200ab00, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001280)) clone(0x4c200, &(0x7f0000000280), &(0x7f0000000380), &(0x7f00000003c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @remote}, 0x0, {0x2, 0x0, @loopback}, 'bond0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x0, @local, 0x0, 0x2, 'wlc\x00'}, 0x2c) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f00000001c0)=""/89, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) umount2(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={&(0x7f0000001840)=ANY=[@ANYRES32, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000003440)={{}, 0x0, 0x4, @inherit={0x60, &(0x7f00000033c0)={0x1, 0x3, 0x7, 0x38ba2ca2, {0x3e, 0x0, 0x0, 0x54, 0x7}, [0xffffffffffff0000, 0x0, 0x0]}}, @devid}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000005c0)={0x0, 0x3}) [ 769.209007][T19981] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 19:17:07 executing program 3: pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_create(0x4) dup(r0) select(0x40, &(0x7f00000001c0)={0x1ff}, 0x0, 0x0, 0x0) 19:17:08 executing program 5: io_setup(0x0, &(0x7f0000000080)) io_setup(0xffff, &(0x7f0000000100)) io_setup(0x0, 0x0) io_setup(0x8, 0x0) 19:17:08 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000480)=0xc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0xa, &(0x7f0000000340)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001", 0x3d, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {0x0, 0x0, 0x6800}, {&(0x7f0000000740)="ed5937", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {0x0, 0x0, 0x11100}, {&(0x7f0000013200), 0x0, 0x11580}], 0x0, &(0x7f00000000c0)) [ 769.682683][T19997] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 769.918705][T20005] 8021q: adding VLAN 0 to HW filter on device bond84 [ 769.935652][T20005] bond0: (slave bond84): Enslaving as an active interface with an up link 19:17:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73665df41100080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010100)='RRaA', 0x4, 0x800}], 0x0, &(0x7f0000011000)) 19:17:08 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) 19:17:09 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x100) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x1000, 0x0, 0x10003f, 0x9, 0x7, 0x0, 0x0, 0x0, 0x11dbada3, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x4c200, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000540)="890cde1d4e74468d9fbf3a432525fa56c58efcc350ace56761035b76ad0398a80dea6e812cf9420c2f07482e4e92da5a3eb9658f074f0ef7d9497ac371e0120c3052c78da63f1bf76c63db4a12e7d6e413f459c8b52439a581") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @remote}, 0x0, {0x2, 0x0, @loopback}, 'bond0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x0, @local, 0x0, 0x2, 'wlc\x00'}, 0x2c) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/89, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) umount2(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000005c0)={0x0, 0x3}) 19:17:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 770.375417][T20047] loop2: detected capacity change from 0 to 264192 [ 770.611519][T20047] EXT4-fs error (device loop2): ext4_orphan_get:1398: comm syz-executor.2: couldn't read orphan inode 17 (err -116) [ 770.629020][T20047] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 770.648270][T20053] loop3: detected capacity change from 0 to 8 [ 770.673294][T20053] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x00000000 (sector = 1) 19:17:09 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000480)=0xc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0xa, &(0x7f0000000340)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001", 0x3d, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {0x0, 0x0, 0x6800}, {&(0x7f0000000740)="ed5937", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {0x0, 0x0, 0x11100}, {&(0x7f0000013200), 0x0, 0x11580}], 0x0, &(0x7f00000000c0)) 19:17:09 executing program 5: io_setup(0x6a1f, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, 0x0) 19:17:09 executing program 3: clock_gettime(0xe34e85ef8ba7dc1e, 0x0) [ 771.211275][T20069] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:09 executing program 4: clock_nanosleep(0x0, 0x1, &(0x7f00000002c0)={0x0, 0x989680}, 0x0) [ 771.385543][T20104] 8021q: adding VLAN 0 to HW filter on device bond85 [ 771.401376][T20104] bond0: (slave bond85): Enslaving as an active interface with an up link 19:17:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000340)) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:10 executing program 3: getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f0000000180)) io_setup(0x8001, &(0x7f00000017c0)) io_submit(0x0, 0x0, &(0x7f0000000840)) pipe2(0x0, 0x0) dup(0xffffffffffffffff) [ 771.742964][T20110] loop2: detected capacity change from 0 to 264192 19:17:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x80800) read(r0, 0x0, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 772.045066][T20110] EXT4-fs error (device loop2): ext4_orphan_get:1398: comm syz-executor.2: couldn't read orphan inode 17 (err -116) 19:17:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x240201) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r1, r0) [ 772.206156][T20110] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 19:17:10 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) [ 772.440941][T20122] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 772.594359][T20122] 8021q: adding VLAN 0 to HW filter on device bond86 [ 772.613375][T20122] bond0: (slave bond86): Enslaving as an active interface with an up link 19:17:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000340)) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:11 executing program 3: io_setup(0x6a1f, &(0x7f0000000040)) io_setup(0x4, &(0x7f0000000240)) io_setup(0x5, &(0x7f0000000180)) io_setup(0x2, &(0x7f00000001c0)) io_setup(0x1ff, &(0x7f0000000200)) 19:17:11 executing program 5: setresuid(0xee00, 0xee01, 0x0) 19:17:11 executing program 4: syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000240)={[{@fat=@uid}]}) 19:17:12 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x7d, 0x1c, 0x3}, 0x1c) 19:17:12 executing program 2: io_setup(0x53d, &(0x7f0000000040)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000340)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) [ 773.706564][T20176] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 773.907156][T20181] 8021q: adding VLAN 0 to HW filter on device bond87 [ 773.922871][T20181] bond0: (slave bond87): Enslaving as an active interface with an up link 19:17:12 executing program 3: io_setup(0x53d, &(0x7f0000000040)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000080)="42c2", 0x2}]) 19:17:12 executing program 2: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fork() [ 774.074303][T20185] FAT-fs (loop4): bogus number of reserved sectors [ 774.081379][T20185] FAT-fs (loop4): Can't find a valid FAT filesystem 19:17:12 executing program 5: syz_mount_image$romfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) 19:17:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000340)) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:13 executing program 0: syz_open_procfs$userns(0x0, &(0x7f0000007e80)) 19:17:13 executing program 4: syz_emit_ethernet(0x6e, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0162c200180286dd60a1b9c100383a00fe80000000000000d5c0c64467000000000000ef845981738faa3ebac3da32fab3"], 0x0) 19:17:13 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "3ef096d767adecbc7d8b9d75dedb91fa536c080e799c577b5ff042ca9c2e01de896947ba2fb9466ca669a04ff69479fbf4f9473a71cc69f5d4dca1e0f253b6e6"}, 0x48, 0xfffffffffffffffd) [ 774.872508][T20233] VFS: Can't find a romfs filesystem on dev loop5. [ 774.872508][T20233] [ 774.929030][T20238] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:13 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/3\x00') preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r1, 0x1, 0x19, &(0x7f00000001c0)='wg2\x00', 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r2 = getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000180)) mmap$dsp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x12b9cb47b260485c, 0x80010, r0, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x3) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000840)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/block/loop0', 0x604000, 0x80) sendto$inet6(r1, &(0x7f0000000200)='\n', 0xfffffdef, 0x4d87a, 0x0, 0x1f4) recvmsg$unix(r3, &(0x7f00000008c0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f00000002c0)=""/114, 0x72}, {0x0}, {0x0}], 0x3, 0x0, 0x138}, 0x2) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v2={0x2000000, [{0x0, 0x48000000}, {0x7, 0xbf}]}, 0x14, 0x0) 19:17:13 executing program 5: r0 = openat$audio(0xffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$mixer_OSS_GETVERSION(r0, 0x80044d76, &(0x7f0000000300)) 19:17:14 executing program 4: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$describe(0x6, r0, 0x0, 0x0) 19:17:14 executing program 0: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) syz_io_uring_setup(0x38e4, &(0x7f0000000900)={0x0, 0x0, 0x4}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 19:17:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) getpid() pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000200)="17", 0x1}, {&(0x7f0000001840)="d107bfbdcb7c7fce26344de10caa66c72861b5946004e18ded4c12b42ef5397e5904d6d74f87e8f756f8130b625ada72eea11e01f6812cae39b1d1596ba3096898de82a882600fafcd3a42d6e8c3a01846465043d926218435caec2a71f4d19f6e31158ebbefe0da348a1b7179dc201c5f5ae6d88e4b4476f39fd6673ee139f4703f1fef103b2f5fce09c6b1cc42aed4f019fc8fe3c05811613bf18b5053bde724d822337a4fabe74161c523", 0xac}, {&(0x7f0000001940)="ccb842c90639a83fa8f16d2fab238d338729a90879e16f7c7baf94ed4948442f6c2161496ffaaf1cc7790d73a1d2e977d1f85a606b8e012b11fa35ca04f1fbbf73aaab86988d28c21094802b0efc3a516b3169acfebf00b0c377387ebd8e6de42bcc062e102ef6b1fd38", 0x6a}, {&(0x7f0000000280)='L', 0x1}, {&(0x7f00000002c0)}], 0x6, 0x9, 0x6) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:17:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 19:17:15 executing program 0: openat$capi20(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 19:17:15 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/3\x00') preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r1, 0x1, 0x19, &(0x7f00000001c0)='wg2\x00', 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r2 = getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000180)) mmap$dsp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x12b9cb47b260485c, 0x80010, r0, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x3) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000840)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/block/loop0', 0x604000, 0x80) sendto$inet6(r1, &(0x7f0000000200)='\n', 0xfffffdef, 0x4d87a, 0x0, 0x1f4) recvmsg$unix(r3, &(0x7f00000008c0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f00000002c0)=""/114, 0x72}, {0x0}, {0x0}], 0x3, 0x0, 0x138}, 0x2) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v2={0x2000000, [{0x0, 0x48000000}, {0x7, 0xbf}]}, 0x14, 0x0) [ 776.623796][T20292] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x403be, 0x0, 0x0, 0x0, 0x40000000, 0xfe80}}], 0x4000000000003be, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="90", 0x1, 0x0, 0x0, 0x0) [ 776.937474][T20314] 8021q: adding VLAN 0 to HW filter on device bond89 [ 776.954396][T20314] bond0: (slave bond89): Enslaving as an active interface with an up link [ 777.040814][T20332] loop7: detected capacity change from 0 to 1036 [ 777.172416][ T987] I/O error, dev loop7, sector 128 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 777.182775][ T987] Buffer I/O error on dev loop7, logical block 16, lost async page write [ 777.191898][ T987] I/O error, dev loop7, sector 136 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 777.202074][ T987] Buffer I/O error on dev loop7, logical block 17, lost async page write [ 777.214573][ T987] I/O error, dev loop7, sector 144 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 777.225384][ T987] Buffer I/O error on dev loop7, logical block 18, lost async page write [ 777.234202][ T987] I/O error, dev loop7, sector 152 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 777.244203][ T987] Buffer I/O error on dev loop7, logical block 19, lost async page write [ 777.252821][ T987] I/O error, dev loop7, sector 160 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 777.262785][ T987] Buffer I/O error on dev loop7, logical block 20, lost async page write 19:17:15 executing program 5: openat$capi20(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) [ 777.271611][ T987] I/O error, dev loop7, sector 168 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 777.281553][ T987] Buffer I/O error on dev loop7, logical block 21, lost async page write [ 777.290284][ T987] I/O error, dev loop7, sector 176 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 777.300552][ T987] Buffer I/O error on dev loop7, logical block 22, lost async page write [ 777.309465][ T987] I/O error, dev loop7, sector 184 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 777.319391][ T987] Buffer I/O error on dev loop7, logical block 23, lost async page write [ 777.328217][ T987] I/O error, dev loop7, sector 192 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 777.338143][ T987] Buffer I/O error on dev loop7, logical block 24, lost async page write [ 777.346942][ T987] I/O error, dev loop7, sector 200 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 777.356885][ T987] Buffer I/O error on dev loop7, logical block 25, lost async page write 19:17:16 executing program 0: r0 = openat$apparmor_task_exec(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 19:17:16 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = inotify_init() ptrace$pokeuser(0x6, 0x0, 0x72, 0x7024bef6) ioctl$SNDCTL_SEQ_GETINCOUNT(0xffffffffffffffff, 0x80045105, &(0x7f0000001200)) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000140)='./file0\x00', 0x800) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) read$rfkill(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) 19:17:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:17 executing program 2: clock_gettime(0x4, &(0x7f00000013c0)) 19:17:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf1a1b082c8d0193a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 19:17:17 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0', [], 0xa, "3091e3cb10b654ba7c41946d0ad650d2c9113fa55d4c02fcf6e6756548"}, 0x28) [ 778.808054][T20355] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_xfrm(r0, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001980)={&(0x7f0000001880)=@newpolicy={0xe4, 0x13, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@loopback}}, [@user_kmaddress={0x2c, 0x13, {@in6=@loopback, @in6=@remote}}]}, 0xe4}}, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) 19:17:17 executing program 3: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000280)) 19:17:18 executing program 2: syz_io_uring_setup(0x57b0, &(0x7f0000000140)={0x0, 0xe375}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 19:17:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:18 executing program 5: openat$proc_capi20ncci(0xffffff9c, 0x0, 0x432000, 0x0) 19:17:18 executing program 4: syz_io_uring_setup(0x38e4, &(0x7f0000000900)={0x0, 0x0, 0x4}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 779.722165][T20401] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:17:18 executing program 0: r0 = openat$audio(0xffffff9c, &(0x7f0000000600), 0x0, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r0, 0x80044dff, 0x0) [ 780.222427][T20410] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:19 executing program 2: clock_gettime(0x6, &(0x7f0000000040)) openat$proc_capi20ncci(0xffffff9c, 0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4004550c, 0x0) 19:17:19 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000002740)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60b85aa700102100fe80000000000000000000000000000000000000000004"], 0x0) [ 780.481142][T20413] 8021q: adding VLAN 0 to HW filter on device bond91 [ 780.497092][T20413] bond0: (slave bond91): Enslaving as an active interface with an up link 19:17:19 executing program 5: connect$l2tp(0xffffffffffffffff, 0x0, 0x0) 19:17:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x12040, 0x0) 19:17:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:19 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[], 0x9, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() ptrace$pokeuser(0x6, 0x0, 0x72, 0x7024bef6) ioctl$SNDCTL_SEQ_GETINCOUNT(0xffffffffffffffff, 0x80045105, &(0x7f0000001200)) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x800) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) read$rfkill(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) 19:17:20 executing program 2: r0 = add_key$keyring(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000600)='pkcs7_test\x00', &(0x7f00000006c0)) 19:17:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:17:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1, 0x2, &(0x7f0000000240)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x74) 19:17:20 executing program 4: r0 = getpid() perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x4, 0x3, 0x6, 0x0, 0x0, 0x7, 0x4002, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x7d, 0x100000000}, 0x20a0, 0x0, 0x1, 0x4, 0x0, 0x511fabd4, 0x9, 0x0, 0x3f, 0x0, 0xa16}, r0, 0x2, 0xffffffffffffffff, 0x3) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000480)=ANY=[@ANYBLOB]) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000100)="c4c235aa1066ba2100b000ee440f070f3235002f0400d4d4910091b8010000000f01d9b90e020000b805000000ba00800000b9800000c00f3235010000000f30420f38c9ee420f928e00000000c48181c6080066baa000ecb0e3ee", 0x5b}], 0x1, 0x6b, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 781.852226][T20464] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 782.059421][T20468] 8021q: adding VLAN 0 to HW filter on device bond92 [ 782.075751][T20468] bond0: (slave bond92): Enslaving as an active interface with an up link [ 782.202877][T20504] loop0: detected capacity change from 0 to 1036 19:17:21 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/3\x00') preadv(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r1, 0x1, 0x19, &(0x7f00000001c0)='wg2\x00', 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000180)) mmap$dsp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x12b9cb47b260485c, 0x80010, r0, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x3) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/block/loop0', 0x604000, 0x80) sendto$inet6(r1, &(0x7f0000000200)='\n', 0xfffffdef, 0x4d87a, 0x0, 0x1f4) recvmsg$unix(r3, &(0x7f00000008c0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f00000002c0)=""/114, 0x72}, {0x0}, {&(0x7f00000005c0)=""/72, 0x48}], 0x3, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000003400000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="3a8e9127893b29cc024bedbdf42a518e75556bbbbfbe292a127f36665f44138a8f3e725ab97a39fef533265c88f433076f3c78c027ae77ea0f005862dce7f89e24d3a15dfd83929972a4c792ddff75c999786e48969e148184dd6ab5840b2c587724bee5dc3ebf5d14880759ed172104479052567fbee1", @ANYBLOB="000000001c00000000", @ANYRES16, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYRES32, @ANYBLOB="d55e4cb682ddeeb4cf828641e8393f9828f62d6b0028162cf78c0744dc11", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x138}, 0x2) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v2={0x2000000, [{0x0, 0x48000000}, {0x7, 0xbf}]}, 0x14, 0x0) 19:17:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:17:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:21 executing program 3: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000180)) [ 783.272227][T20521] loop7: detected capacity change from 0 to 1036 [ 783.360208][T20522] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 783.526436][T20525] 8021q: adding VLAN 0 to HW filter on device bond93 [ 783.542322][T20525] bond0: (slave bond93): Enslaving as an active interface with an up link [ 783.583768][T20526] blk_print_req_error: 6 callbacks suppressed [ 783.583832][T20526] I/O error, dev loop7, sector 256 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 19:17:22 executing program 3: socketpair(0x1, 0x0, 0x8, &(0x7f0000000100)) 19:17:22 executing program 5: socketpair(0x2, 0x6, 0x0, &(0x7f00000000c0)) 19:17:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/3\x00') preadv(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r1, 0x1, 0x19, &(0x7f00000001c0)='wg2\x00', 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000180)) mmap$dsp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x12b9cb47b260485c, 0x80010, r0, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x3) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/block/loop0', 0x604000, 0x80) sendto$inet6(r1, &(0x7f0000000200)='\n', 0xfffffdef, 0x4d87a, 0x0, 0x1f4) recvmsg$unix(r3, &(0x7f00000008c0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f00000002c0)=""/114, 0x72}, {0x0}, {&(0x7f00000005c0)=""/72, 0x48}], 0x3, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000003400000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="3a8e9127893b29cc024bedbdf42a518e75556bbbbfbe292a127f36665f44138a8f3e725ab97a39fef533265c88f433076f3c78c027ae77ea0f005862dce7f89e24d3a15dfd83929972a4c792ddff75c999786e48969e148184dd6ab5840b2c587724bee5dc3ebf5d14880759ed172104479052567fbee1", @ANYBLOB="000000001c00000000", @ANYRES16, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYRES32, @ANYBLOB="d55e4cb682ddeeb4cf828641e8393f9828f62d6b0028162cf78c0744dc11", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x138}, 0x2) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v2={0x2000000, [{0x0, 0x48000000}, {0x7, 0xbf}]}, 0x14, 0x0) 19:17:24 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 19:17:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="110e020000000000140012800b00010062726964676500000400227d"], 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:24 executing program 3: syz_io_uring_setup(0x4, &(0x7f0000000440)={0x0, 0x0, 0x20}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff1000/0xf000)=nil, 0x0, 0x0) 19:17:24 executing program 5: openat2$dir(0xffffff9c, 0x0, &(0x7f0000007a80)={0x0, 0x0, 0x18}, 0x18) 19:17:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[], 0x9, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x800) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) read$rfkill(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) 19:17:24 executing program 4: openat$proc_capi20ncci(0xffffff9c, &(0x7f0000000180), 0x2601, 0x0) 19:17:24 executing program 3: r0 = io_uring_setup(0x33e4, &(0x7f0000001200)={0x0, 0x0, 0x1}) close(r0) 19:17:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_xfrm(r0, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001980)={&(0x7f0000001880)=@newpolicy={0xe4, 0x13, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@loopback}}, [@user_kmaddress={0x2c, 0x13, {@in6=@loopback, @in6=@remote}}]}, 0xe4}}, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) [ 785.933992][T20591] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:24 executing program 4: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x4b, 0xfe, 0xe9, 0x8, 0xfe6, 0x9800, 0x195d, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2c, 0xeb, 0x14}}]}}]}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xchacha20-simd,anubis-generic,nhpoly1305-sse2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="c99b57381801238c09d0ff0f1d0dbd301e5a47b2f3caa73dcd2a6a370554375a", 0x20) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005700)=[{{0x0, 0x0, &(0x7f0000004200)=[{&(0x7f00000030c0)=""/4104, 0x1008}], 0x1}}], 0xe4, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000006580)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001580)="6ed853b5a65aa2c9c93e3957508ad177", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000005400)=[{&(0x7f0000003080)='e', 0x1}], 0x1}}], 0x2, 0x0) sendmsg$netlink(r1, &(0x7f0000000180)={&(0x7f0000000040), 0x1, &(0x7f0000000140)=[{&(0x7f00000005c0)=ANY=[], 0x20c}], 0x1}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x803, 0x0) 19:17:25 executing program 0: syz_emit_ethernet(0xffffffffffffff3a, 0x0, 0x0) 19:17:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 786.559203][ T2827] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 786.584651][T20636] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 19:17:25 executing program 3: openat$proc_capi20ncci(0xffffff9c, &(0x7f0000002800), 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffff9c, &(0x7f00000000c0), 0x8280, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 19:17:25 executing program 5: syz_open_procfs(0x0, &(0x7f00000002c0)='pagemap\x00') [ 786.803680][ T2827] usb 5-1: Using ep0 maxpacket: 8 [ 786.925983][ T2827] usb 5-1: New USB device found, idVendor=0fe6, idProduct=9800, bcdDevice=19.5d [ 786.939232][ T2827] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 19:17:25 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000000)={0x0, 0x0, '\x00', [@enc_lim]}, 0x10) [ 787.035465][ T2827] usb 5-1: config 0 descriptor?? [ 787.055143][T20640] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 787.194635][T20645] 8021q: adding VLAN 0 to HW filter on device bond95 [ 787.210803][T20645] bond0: (slave bond95): Enslaving as an active interface with an up link 19:17:26 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0xa, &(0x7f00000000c0), 0x4) 19:17:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 788.033881][ T2827] CoreChips 5-1:0.0 (unnamed net_device) (uninitialized): set LINK LED failed : -71 [ 788.044478][ T2827] CoreChips: probe of 5-1:0.0 failed with error -71 [ 788.167298][ T2827] usb 5-1: USB disconnect, device number 2 [ 788.452453][T20705] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:27 executing program 2: syz_usb_connect(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xchacha20-simd,anubis-generic,nhpoly1305-sse2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="c99b57381801238c09d0ff0f1d0dbd301e5a47b2f3caa73dcd2a6a370554375a", 0x20) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005700)=[{{0x0, 0x0, &(0x7f0000004200)=[{&(0x7f00000030c0)=""/4104, 0x1008}], 0x1}}], 0xe4, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000006580)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001580)="6ed853b5a65aa2c9c93e3957508ad177", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000005400)=[{&(0x7f0000003080)='e', 0x1}], 0x1}}], 0x2, 0x0) sendmsg$netlink(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000005c0)=ANY=[], 0x20c}], 0x1}, 0x0) 19:17:27 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x800) read$rfkill(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 19:17:27 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[], 0x9, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000140)='./file0\x00', 0x800) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) read$rfkill(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) [ 788.618565][T20707] 8021q: adding VLAN 0 to HW filter on device bond96 [ 788.634967][T20707] bond0: (slave bond96): Enslaving as an active interface with an up link 19:17:27 executing program 4: r0 = openat$proc_capi20ncci(0xffffff9c, &(0x7f0000002800), 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x402c5828, 0x0) 19:17:27 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}, 0x0) [ 788.775284][ T24] audit: type=1804 audit(1639423047.470:36): pid=20744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir837379644/syzkaller.A9UEVo/469/file0" dev="sda1" ino=14631 res=1 errno=0 19:17:27 executing program 3: mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x8) 19:17:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:27 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000000)=0xe638, 0x4) 19:17:28 executing program 5: socketpair(0x1c, 0x3, 0x83, 0x0) 19:17:28 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) [ 789.519076][T20758] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 789.652116][T20762] 8021q: adding VLAN 0 to HW filter on device bond97 [ 789.668990][T20762] bond0: (slave bond97): Enslaving as an active interface with an up link 19:17:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0x0) 19:17:28 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) fcntl$lock(r0, 0xd, &(0x7f0000000200)) 19:17:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_udplite(0x1c, 0x2, 0x88) ppoll(&(0x7f0000001b00)=[{r0, 0x4}, {r1}], 0x2, 0x0, 0x0, 0x0) 19:17:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:29 executing program 5: socketpair(0x0, 0x0, 0x83, 0x0) 19:17:29 executing program 4: setpriority(0x2, 0xffff5784, 0x0) 19:17:29 executing program 3: munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 19:17:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000001b00)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) [ 790.706209][T20816] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 790.905542][T20818] 8021q: adding VLAN 0 to HW filter on device bond98 [ 790.921477][T20818] bond0: (slave bond98): Enslaving as an active interface with an up link 19:17:29 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x1b, 0x0, 0x0) 19:17:29 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0xa, 0x0, 0x0) 19:17:29 executing program 3: r0 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f00000000c0)=ANY=[], 0x20) 19:17:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000001b00)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) [ 791.691258][T20872] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:30 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000000), 0x4) 19:17:30 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) fcntl$lock(r0, 0x0, 0x0) [ 792.057621][T20877] 8021q: adding VLAN 0 to HW filter on device bond99 [ 792.073744][T20877] bond0: (slave bond99): Enslaving as an active interface with an up link 19:17:30 executing program 3: connect$inet6(0xffffffffffffffff, 0x0, 0x0) 19:17:31 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) r1 = dup(r0) sendmsg$unix(r1, &(0x7f0000000240)={&(0x7f0000000100)=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f00000001c0)=[@rights], 0xc}, 0x20100) 19:17:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:31 executing program 2: nanosleep(&(0x7f0000000000)={0x700000}, 0x0) 19:17:31 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x23, 0x0, 0x0) [ 792.928326][T20930] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:31 executing program 5: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/88) 19:17:31 executing program 3: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x0) [ 793.096499][T20935] 8021q: adding VLAN 0 to HW filter on device bond100 [ 793.112551][T20935] bond0: (slave bond100): Enslaving as an active interface with an up link 19:17:31 executing program 0: pipe2(&(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002bc0)) 19:17:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, &(0x7f0000000240)=@abs, 0x0) 19:17:32 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000001500)=[{&(0x7f0000000040)=';', 0x1}, {&(0x7f00000000c0)='a', 0x1}, {0x0}], 0x3) 19:17:32 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f00000015c0)='./file0\x00', 0x0) 19:17:32 executing program 0: pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) preadv(r0, &(0x7f0000000840)=[{0x0}], 0x1, 0x0, 0x0) 19:17:32 executing program 2: bind$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs={0x0, 0x0, 0x3}, 0x8) [ 794.094630][T20984] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 794.235014][T20987] 8021q: adding VLAN 0 to HW filter on device bond101 [ 794.251374][T20987] bond0: (slave bond101): Enslaving as an active interface with an up link 19:17:33 executing program 4: getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000)=0x2, &(0x7f0000000040)=0x1) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000080)=""/118, &(0x7f0000000100)=0x76) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000140)={0x200, 0x9, 0x2, 0x8}) ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_route(0x10, 0x3, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0xff}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f00000001c0)=""/227, &(0x7f00000002c0)=0xe3) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000300)=""/255) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000400)) syz_usbip_server_init(0x5) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:17:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000007c0)=@delchain={0x24, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0x2}, {0x0, 0xffff}}}, 0x24}}, 0x0) 19:17:33 executing program 3: r0 = socket(0x11, 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, 0x0, 0x0) 19:17:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x3f, 0x20a, 0x1}, 0x40) 19:17:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xe) [ 794.918919][T21031] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 794.925629][T21031] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 794.937209][T21031] vhci_hcd vhci_hcd.0: Device attached [ 795.065226][T21032] vhci_hcd: connection closed [ 795.066333][ T8427] vhci_hcd: stop threads [ 795.075687][ T8427] vhci_hcd: release socket [ 795.080233][ T8427] vhci_hcd: disconnect device 19:17:33 executing program 5: socketpair(0x2c, 0x3, 0x0, &(0x7f0000003680)) 19:17:34 executing program 3: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r0, 0x800c5012, &(0x7f0000000000)) 19:17:34 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0xe202) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 19:17:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x40049409, &(0x7f00000003c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "d8f0d01cfd9e07ca70f4ab2380ac74d0790bf516c50b609e7a9dd84238eb3f720f48bc50d2ee7805034baab3517334480ca0e346c3b12509d708c28ad065bc54", "25d79397dba88961d572b785f10d0071b6d91d6c003f0558023611ab86563e26"}) [ 795.656828][T21045] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 795.814687][T21047] 8021q: adding VLAN 0 to HW filter on device bond102 [ 795.831789][T21047] bond0: (slave bond102): Enslaving as an active interface with an up link 19:17:34 executing program 3: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_sack\x00', 0x1, 0x0) write$sysctl(r0, 0x0, 0x0) 19:17:34 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000080)) 19:17:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:35 executing program 2: socketpair(0x1e, 0x5, 0x0, &(0x7f0000003680)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) 19:17:35 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000003680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) 19:17:35 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000600)={0x40}, 0x10) 19:17:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x127e, &(0x7f00000003c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "d8f0d01cfd9e07ca70f4ab2380ac74d0790bf516c50b609e7a9dd84238eb3f720f48bc50d2ee7805034baab3517334480ca0e346c3b12509d708c28ad065bc54", "25d79397dba88961d572b785f10d0071b6d91d6c003f0558023611ab86563e26"}) [ 796.875991][T21098] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:35 executing program 5: syz_open_dev$evdev(&(0x7f0000001700), 0x0, 0x4000) [ 797.041682][T21125] 8021q: adding VLAN 0 to HW filter on device bond103 [ 797.058536][T21125] bond0: (slave bond103): Enslaving as an active interface with an up link 19:17:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:35 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000000)={0x20000001}) 19:17:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=ANY=[@ANYBLOB="4400000024001d0f00"/20, @ANYRES32=r2, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000007c0)=@delchain={0x64, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0xfff3}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x34, 0x2, [@TCA_CGROUP_ACT={0x30, 0x1, [@m_xt={0x2c, 0x0, 0x0, 0x0, {{0x7}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0xf00}}}}]}]}}]}, 0x64}}, 0x0) 19:17:36 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000400)) 19:17:36 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000001c0)) 19:17:36 executing program 3: socketpair(0x29, 0x2, 0x0, &(0x7f0000000400)) [ 797.724462][T21147] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 797.852856][T21153] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 797.915153][T21184] 8021q: adding VLAN 0 to HW filter on device bond104 [ 797.931808][T21184] bond0: (slave bond104): Enslaving as an active interface with an up link 19:17:36 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@size={'size', 0x3d, [0x30]}}]}) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) creat(0x0, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, 0x0) 19:17:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2meta(0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[{0x0}], 0x0, 0x0) 19:17:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x401070c9, 0x0) 19:17:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:37 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f00000006c0), 0x4) 19:17:37 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create(0x7f) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)) 19:17:37 executing program 4: accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x100800) 19:17:37 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000040)) [ 798.707663][T21202] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:37 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 798.841419][T21204] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 798.939375][T21206] 8021q: adding VLAN 0 to HW filter on device bond105 [ 798.955955][T21206] bond0: (slave bond105): Enslaving as an active interface with an up link 19:17:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x5451, 0x0) 19:17:37 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0101282, 0x0) 19:17:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x3c}}, 0x0) 19:17:38 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0xe202) ioctl$LOOP_SET_STATUS(r0, 0x1277, 0x0) 19:17:38 executing program 0: socketpair(0x22, 0x0, 0x4, &(0x7f0000000400)) 19:17:38 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) [ 799.907578][T21261] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:38 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, 0x0, 0x0) 19:17:38 executing program 2: socket(0x1, 0x0, 0x101) 19:17:38 executing program 4: socketpair(0x29, 0x2, 0x1ff, &(0x7f0000000400)) 19:17:39 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000040)={r0}) [ 800.270125][T21264] 8021q: adding VLAN 0 to HW filter on device bond106 [ 800.286890][T21264] bond0: (slave bond106): Enslaving as an active interface with an up link 19:17:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0xe202) write$binfmt_aout(r0, 0x0, 0x0) 19:17:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000440)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x18, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2ce6}]}, 0x3c}}, 0x0) 19:17:39 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) 19:17:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000002000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000002040)={@loopback, 0x0, r2}) 19:17:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) readahead(r0, 0x0, 0x0) [ 801.191897][T21315] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 801.340228][T21350] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 19:17:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, 0x0, &(0x7f00000000c0)) [ 801.401617][T21317] 8021q: adding VLAN 0 to HW filter on device bond107 [ 801.419034][T21317] bond0: (slave bond107): Enslaving as an active interface with an up link 19:17:40 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) 19:17:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:40 executing program 2: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) 19:17:40 executing program 0: socketpair(0x26, 0x5, 0x0, &(0x7f0000003680)) 19:17:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x401070cd, 0x0) 19:17:40 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, 0x0) 19:17:40 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x98840, 0x0) [ 802.322000][T21367] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:41 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000280)=@name, 0x10) [ 802.459131][T21370] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 19:17:41 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000040)=@id, 0x10) 19:17:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:41 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x1f, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 19:17:41 executing program 5: syz_open_dev$ndb(&(0x7f0000000140), 0x0, 0x0) 19:17:41 executing program 3: socketpair(0x28, 0x2, 0x0, &(0x7f0000003680)) 19:17:41 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r0, 0x800c5012, 0x0) [ 803.194334][T21418] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:42 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x401070ca, 0x0) [ 803.335497][T21427] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 803.368760][T21427] 8021q: adding VLAN 0 to HW filter on device bond109 [ 803.385374][T21427] bond0: (slave bond109): Enslaving as an active interface with an up link 19:17:42 executing program 2: bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) 19:17:42 executing program 3: r0 = socket(0x11, 0x3, 0x0) io_setup(0x7ff, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f0000002900)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0, 0x0, 0x1}]) 19:17:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000000000/0x2000)=nil, 0x2000) 19:17:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)) 19:17:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=@ipv4_newrule={0x30, 0x20, 0x329, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_IIFNAME={0x14, 0x3, 'veth1_vlan\x00'}]}, 0x30}}, 0x0) 19:17:42 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000002100), 0x0, 0x0) setns(r0, 0x0) [ 804.328652][T21472] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x6, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x5, 0x8001, 0x0, 0x0, 0xffffffffffffffff}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, 0x0) [ 804.479337][T21507] 8021q: adding VLAN 0 to HW filter on device bond110 [ 804.495871][T21507] bond0: (slave bond110): Enslaving as an active interface with an up link [ 804.541555][T21474] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 19:17:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000001200), 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000001240)) 19:17:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:43 executing program 0: syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f00000004c0), 0x6000, &(0x7f0000008780)) 19:17:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_vlan\x00', &(0x7f0000000000)=@ethtool_eeprom}) 19:17:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f0000000180)) 19:17:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, &(0x7f0000000280)) 19:17:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa}]}, 0x2c}}, 0x0) r2 = memfd_create(&(0x7f00000002c0)='/s\xcb\x9cF2\x1d\b\x00\xca\xdc[\x17\x8b\xb2\xf7W\xf0\xfb\xff\xff\xff\xff\xff\xff\xffvelindf\xda\xf7\xe7VP]\x87\xbb\xbd\b\x00\x00\x00\rM\xea\x90r\r\xa6R\xb4\xb8\xa1\x98\xb43\xa6,\xe2x\x12\xfaw\xaa\xef\x96\xfb\x9a\xb9\x1f\xe2M\xf2\xb5]C\xb2-\xa1\x06\x00\x00\x00\xe93\xf2\xd6\x03\'\xaa(\x8f\xaf\f7\n\xcf\xaf\xd6\x1fC\xe0\xf3g\x81\xf3o$\x03\x89\xf7\xb6\xed\xd0\xd2\x18j\x8f\x9b\xd1\x8a\xda\\;\xb6\xf4\'y\x17\x7f\xc5\x90\xcc\xe9\xdc\xa7\a\xe2J8x\xad/\xba\xb1m\x11\x03J\x7f\xe4m\xe6T\xe9\x04\x10\x00\x19Y\x92$O_\xf6\xb6\x1cePR\xcf\x1c\xbd\x03\x9a\xca\xc1_\xfb\xd0n\xc0\xc6\x04\xa8\x9c\xf5\xa7\xde\xf8&\x1d\xadUg\xb5S5\xefD\x04\x160\xafy\x02\\\xcb1\x8f\xaeh\x8c~8\x9f\xf3\xd5\x0f\xef\xb0\x0fZ\xfd\x05\xed\xfd\x82\xbd*\x192\x06\xcb1t\xd0\x7f\x8c\x9f?\xd4x0\\\x1b\xe2Po\xef\xe1\xc4J\xcbz\x17\a\xf6\xac\xc1y\xe1\x8f\x17\\\xbcp\xaa\xa6\xc6\xd5\r\xbbm\x83e\xa1\xb1e\xc1\x88\xfe\xb8=\x1d\xc1(\xb7\xb7\"\xb8\x143r\xd5gL\xb4\x10d\xe9\xed\x19\xa3y\xe1\x80k\xbb;\xf7U\x13U\x0e\xd1{\xcb\xa6H\n\x7f,B\x93\xe4`d\x95zL\xee[w\x06(\xb1\x84\x11\xd9\x04\x99\x01\x192\xe3\xa88~4\x99\xd0U\xcd\xfa\x1d%e*\x02\xa0\x9b^\xa6\xcf9W\x9d\xcd \xb8K\"D\xaf\x1aS\x88\xb22\xff\x9d7\xbe\xb1-\x7f\xaay\x1ee\xba\b\xe8\x12\xa0\xb6\x1a7\x8f\x05j\x8a\xe9\xdf\x1c\xa0\xfc\x90\xb9\x00\x14\x11\xeb\x00]\xfc\xd1\xb1\xe4\x90tE\x99\xe8b\xf8\x00\x00\x00\xdaw\xcb?M<\xd0Z\x11Gp\xe4\xeb\xddj0t\xf05\xe2)B\xf0\r-\a\xd2\x16+F\xf2\xe0z\xbd\x97\x9bo\xbf\xcc\xe5\xfd\xec\x99\xe3\xf4\x18\x93C\xbb#\x19\x9b\\\x03\x00\x00\x00\x15/\xb8\xdb\xe5y\xb2\xd1\xbb\xdd\x84\x90\xa9\f`\x0e', 0x0) dup3(r2, r2, 0x80000) fchown(0xffffffffffffffff, 0xee00, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001400210100000000000000000a00000056adc976b271afc9b5f66d539396f52e55f9b23919ffdc9b4229c1c0b149a432bf3996c04b4a8c0b15c4d630a606faf454884092c67f8223fc6a69209074ff1a872b69ab", @ANYRES32, @ANYBLOB="1400020000000000000000000000000000000001"], 0x2c}}, 0x0) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x7a2ec, 0xfffffffffffffffb) [ 805.308257][T21523] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 805.586335][T21528] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 805.605162][T21529] 8021q: adding VLAN 0 to HW filter on device bond111 [ 805.621418][T21529] bond0: (slave bond111): Enslaving as an active interface with an up link 19:17:44 executing program 0: r0 = socket(0xa, 0x3, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 19:17:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b00"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 806.071174][T21572] Option ' ›\' to dns_resolver key: bad/missing value 19:17:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x44, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r3}, @val={0xc}}}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'ip6gretap0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}]}, 0x44}}, 0x0) 19:17:44 executing program 4: eventfd(0x100) r0 = open(0x0, 0x102e0, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) r1 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000040)={0x0, 0x22, 0x0, 0xd, 0x7, 0x47, 0x6, 0x0, 0xffffffffffffffff}) r3 = dup3(r1, r1, 0x80000) recvmmsg(r3, &(0x7f0000005300)=[{{&(0x7f00000005c0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000017c0)=[{0x0}], 0x1, &(0x7f0000001800)=""/121, 0x79}, 0x9}, {{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001900)=""/227, 0xe3}], 0x1}, 0x50e}, {{&(0x7f0000001a80)=@can, 0x80, &(0x7f0000003b80)=[{&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/67, 0x43}, {&(0x7f0000002b80)=""/4096, 0x1000}], 0x3, &(0x7f0000003bc0)=""/115, 0x73}, 0xfffffffb}, {{0x0, 0x0, &(0x7f0000003ec0)=[{0x0}, {0x0}], 0x2, &(0x7f0000003f00)=""/4096, 0x1000}, 0x2}, {{0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f00000050c0)=""/200, 0xc8}], 0x1, &(0x7f0000005200)=""/218, 0xda}, 0x8}], 0x5, 0x2020, &(0x7f0000005480)) preadv(0xffffffffffffffff, &(0x7f0000005ac0)=[{&(0x7f0000005600)=""/196, 0xc4}, {&(0x7f0000005700)=""/191, 0xbf}, {0x0}, {&(0x7f00000058c0)=""/211, 0xd3}, {&(0x7f00000059c0)=""/15, 0xf}, {&(0x7f0000005a00)=""/187, 0xbb}], 0x6, 0x9, 0x1) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x3a, 0x19, 0x10, 0xd, 0x6, 0x1000}}) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000180)={0x7, 0x0, 0x13, 0x1a, 0x1, 0xbd80, 0x0, 0x135}) ioctl$RTC_SET_TIME(r2, 0x4024700a, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) 19:17:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x1f, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x5) 19:17:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 19:17:45 executing program 0: syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x0) [ 806.555451][T21579] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 806.719154][T21584] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 806.778709][T21621] 8021q: adding VLAN 0 to HW filter on device bond112 [ 806.795862][T21621] bond0: (slave bond112): Enslaving as an active interface with an up link 19:17:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/fs/cgroup', 0x0, 0x0) 19:17:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0) read(r0, &(0x7f0000000000), 0x2000) [ 807.104995][T21627] rtc_cmos 00:00: Alarms can be up to one day in the future 19:17:45 executing program 2: io_setup(0x3, &(0x7f00000000c0)=0x0) r1 = eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000200)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) write$eventfd(r1, &(0x7f0000000180), 0x8) 19:17:45 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000480)={0x9558}) 19:17:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b0001006272696467"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) [ 807.230286][T21586] rtc_cmos 00:00: Alarms can be up to one day in the future 19:17:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, &(0x7f0000004480)) [ 807.302984][T16221] rtc_cmos 00:00: Alarms can be up to one day in the future [ 807.313683][T16221] rtc_cmos 00:00: Alarms can be up to one day in the future [ 807.321805][T16221] rtc_cmos 00:00: Alarms can be up to one day in the future [ 807.330198][T16221] rtc_cmos 00:00: Alarms can be up to one day in the future [ 807.338107][T16221] rtc rtc0: __rtc_set_alarm: err=-22 19:17:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000040)=0x7ff, 0x4) [ 807.915983][T21640] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 19:17:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') read$FUSE(r0, &(0x7f0000002c40)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) [ 808.073457][T21644] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 19:17:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x6, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 808.125995][T21656] 8021q: adding VLAN 0 to HW filter on device bond113 [ 808.147152][T21656] bond0: (slave bond113): Enslaving as an active interface with an up link 19:17:46 executing program 5: add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="e5", 0x1, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000440), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$setperm(0x5, r0, 0x0) 19:17:47 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x100) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x22, 0x0, 0xd, 0x7, 0x0, 0x6, 0x0, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000005300)=[{{&(0x7f00000005c0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/102, 0x66}, {&(0x7f00000016c0)=""/126, 0x7e}], 0x3, &(0x7f0000001800)=""/121, 0x79}, 0x9}, {{0x0, 0x0, &(0x7f0000001a00)=[{0x0}], 0x1, &(0x7f0000001a40)=""/37, 0x25}}, {{&(0x7f0000001a80)=@can, 0x80, &(0x7f0000003b80)=[{&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/67, 0x43}, {&(0x7f0000002b80)=""/4096, 0x1000}], 0x3, &(0x7f0000003bc0)=""/115, 0x73}, 0xfffffffb}, {{&(0x7f0000003c40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000003ec0)=[{0x0}, {0x0}], 0x2, &(0x7f0000003f00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000004f00)=@l2tp6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, 0x80, 0x0, 0x0, &(0x7f0000005200)=""/218, 0xda}, 0x8}], 0x5, 0x2020, &(0x7f0000005480)) preadv(r2, &(0x7f0000005ac0)=[{&(0x7f00000054c0)=""/167, 0xa7}, {&(0x7f0000005600)=""/196, 0xc4}, {&(0x7f0000005700)=""/191, 0xbf}, {&(0x7f00000057c0)=""/223, 0xdf}, {&(0x7f00000058c0)=""/211, 0xd3}, {0x0}, {&(0x7f0000005a00)=""/187, 0xbb}], 0x7, 0x9, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x3a, 0x19, 0x0, 0xd, 0x0, 0x1000}}) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x9, 0x0, 0x15, 0x8, 0x0, 0xe5f2, 0x2}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000180)={0x7, 0x0, 0x13, 0x1a, 0x1, 0xbd80}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) 19:17:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b0001006272696467"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:47 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x1f, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 19:17:47 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x100) r0 = open(&(0x7f0000000240)='./file0\x00', 0x102e0, 0x0) fcntl$setsig(r0, 0xa, 0x11) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x0, 0x22, 0x0, 0xd, 0x7, 0x47, 0x6, 0x0, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000005300)=[{{&(0x7f00000005c0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/126, 0x7e}], 0x2, &(0x7f0000001800)=""/121, 0x79}, 0x9}, {{0x0, 0x0, &(0x7f0000001a00), 0x0, &(0x7f0000001a40)=""/37, 0x25}, 0x50e}, {{&(0x7f0000001a80)=@can, 0x80, &(0x7f0000003b80)=[{0x0}], 0x1, &(0x7f0000003bc0)=""/115, 0x73}, 0xfffffffb}, {{&(0x7f0000003c40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000003ec0)=[{0x0}, {0x0}], 0x2, &(0x7f0000003f00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000004f00)=@l2tp6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000004f80)=""/94, 0x5e}, {&(0x7f00000050c0)=""/200, 0xc8}], 0x2, &(0x7f0000005200)=""/218, 0xda}, 0x8}], 0x5, 0x2020, &(0x7f0000005480)) preadv(0xffffffffffffffff, &(0x7f0000005ac0)=[{0x0}, {0x0}, {&(0x7f00000058c0)=""/211, 0xd3}, {&(0x7f00000059c0)=""/15, 0xf}, {&(0x7f0000005a00)=""/187, 0xbb}], 0x5, 0x0, 0x1) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x3a, 0x19, 0x10, 0xd, 0x6, 0x1000}}) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000180)={0x7, 0x0, 0x13, 0x1a, 0x0, 0xbd80, 0x0, 0x135}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4204, 0x0, 0x6, &(0x7f00000000c0)={&(0x7f0000000080)=""/57, 0x39}) 19:17:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x1c}}, 0x0) 19:17:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0x0) [ 809.064090][T21691] rtc_cmos 00:00: Alarms can be up to one day in the future [ 809.112086][T21690] rtc_cmos 00:00: Alarms can be up to one day in the future 19:17:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6b4f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) io_submit(0x0, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000540)=[{0x10}, {0x10}, {0x10}, {0x10, 0x0, 0x101}], 0x40}, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x8, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x7f00}, 0x1c) [ 809.305259][T16221] rtc_cmos 00:00: Alarms can be up to one day in the future [ 809.313012][T16221] rtc_cmos 00:00: Alarms can be up to one day in the future [ 809.320908][T16221] rtc_cmos 00:00: Alarms can be up to one day in the future [ 809.328879][T16221] rtc_cmos 00:00: Alarms can be up to one day in the future [ 809.336606][T16221] rtc rtc0: __rtc_set_alarm: err=-22 [ 809.366229][T21697] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 809.403541][T21696] rtc_cmos 00:00: Alarms can be up to one day in the future [ 809.459480][T21694] rtc_cmos 00:00: Alarms can be up to one day in the future [ 809.574404][T16221] rtc_cmos 00:00: Alarms can be up to one day in the future [ 809.582198][T16221] rtc_cmos 00:00: Alarms can be up to one day in the future [ 809.591278][T16221] rtc_cmos 00:00: Alarms can be up to one day in the future [ 809.599025][T16221] rtc_cmos 00:00: Alarms can be up to one day in the future [ 809.606542][T16221] rtc rtc0: __rtc_set_alarm: err=-22 19:17:48 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x1f, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) [ 809.615891][T21702] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 809.635726][T21727] 8021q: adding VLAN 0 to HW filter on device bond114 [ 809.652106][T21727] bond0: (slave bond114): Enslaving as an active interface with an up link 19:17:48 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x100) r0 = open(&(0x7f0000000240)='./file0\x00', 0x102e0, 0x0) fcntl$setsig(r0, 0xa, 0x11) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x0, 0x22, 0x0, 0xd, 0x7, 0x47, 0x6, 0x0, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000005300)=[{{&(0x7f00000005c0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/126, 0x7e}], 0x2, &(0x7f0000001800)=""/121, 0x79}, 0x9}, {{0x0, 0x0, &(0x7f0000001a00), 0x0, &(0x7f0000001a40)=""/37, 0x25}, 0x50e}, {{&(0x7f0000001a80)=@can, 0x80, &(0x7f0000003b80)=[{0x0}], 0x1, &(0x7f0000003bc0)=""/115, 0x73}, 0xfffffffb}, {{&(0x7f0000003c40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000003ec0)=[{0x0}, {0x0}], 0x2, &(0x7f0000003f00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000004f00)=@l2tp6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000004f80)=""/94, 0x5e}, {&(0x7f00000050c0)=""/200, 0xc8}], 0x2, &(0x7f0000005200)=""/218, 0xda}, 0x8}], 0x5, 0x2020, &(0x7f0000005480)) preadv(0xffffffffffffffff, &(0x7f0000005ac0)=[{0x0}, {0x0}, {&(0x7f00000058c0)=""/211, 0xd3}, {&(0x7f00000059c0)=""/15, 0xf}, {&(0x7f0000005a00)=""/187, 0xbb}], 0x5, 0x0, 0x1) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x3a, 0x19, 0x10, 0xd, 0x6, 0x1000}}) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000180)={0x7, 0x0, 0x13, 0x1a, 0x0, 0xbd80, 0x0, 0x135}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4204, 0x0, 0x6, &(0x7f00000000c0)={&(0x7f0000000080)=""/57, 0x39}) 19:17:48 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x100) r0 = open(&(0x7f0000000240)='./file0\x00', 0x102e0, 0x0) fcntl$setsig(r0, 0xa, 0x11) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x0, 0x22, 0x0, 0xd, 0x7, 0x47, 0x6, 0x0, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000005300)=[{{&(0x7f00000005c0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/126, 0x7e}], 0x2, &(0x7f0000001800)=""/121, 0x79}, 0x9}, {{0x0, 0x0, &(0x7f0000001a00), 0x0, &(0x7f0000001a40)=""/37, 0x25}, 0x50e}, {{&(0x7f0000001a80)=@can, 0x80, &(0x7f0000003b80)=[{0x0}], 0x1, &(0x7f0000003bc0)=""/115, 0x73}, 0xfffffffb}, {{&(0x7f0000003c40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000003ec0)=[{0x0}, {0x0}], 0x2, &(0x7f0000003f00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000004f00)=@l2tp6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000004f80)=""/94, 0x5e}, {&(0x7f00000050c0)=""/200, 0xc8}], 0x2, &(0x7f0000005200)=""/218, 0xda}, 0x8}], 0x5, 0x2020, &(0x7f0000005480)) preadv(0xffffffffffffffff, &(0x7f0000005ac0)=[{0x0}, {0x0}, {&(0x7f00000058c0)=""/211, 0xd3}, {&(0x7f00000059c0)=""/15, 0xf}, {&(0x7f0000005a00)=""/187, 0xbb}], 0x5, 0x0, 0x1) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x3a, 0x19, 0x10, 0xd, 0x6, 0x1000}}) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000180)={0x7, 0x0, 0x13, 0x1a, 0x0, 0xbd80, 0x0, 0x135}) ioctl$RTC_SET_TIME(r1, 0x4024700a, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4204, 0x0, 0x6, &(0x7f00000000c0)={&(0x7f0000000080)=""/57, 0x39}) 19:17:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x7b, 0x0, &(0x7f0000000200)) 19:17:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="110e020000000000140012800b0001006272696467"], 0x34}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000000053000000", @ANYRES32=r9, @ANYBLOB="000000000000000008000a000f"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0) 19:17:49 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x1f, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) [ 810.419498][T21746] rtc_cmos 00:00: Alarms can be up to one day in the future [ 810.508912][ T2840] ===================================================== [ 810.516072][ T2840] BUG: KMSAN: uninit-value in string+0x3d2/0x700 [ 810.522463][ T2840] string+0x3d2/0x700 [ 810.526499][ T2840] vsnprintf+0x224f/0x36a0 [ 810.530971][ T2840] scnprintf+0x23c/0x340 [ 810.535268][ T2840] devkmsg_read+0x6d1/0x1170 [ 810.539976][ T2840] vfs_read+0x6c8/0x1980 [ 810.544390][ T2840] ksys_read+0x28c/0x520 [ 810.548682][ T2840] __x64_sys_read+0xdb/0x120 [ 810.553316][ T2840] do_syscall_64+0x54/0xd0 [ 810.557801][ T2840] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 810.563804][ T2840] [ 810.566142][ T2840] Local variable name created at: [ 810.571173][ T2840] __fsnotify_parent+0x23c/0x1010 [ 810.576303][ T2840] fsnotify_perm+0x702/0xa80 [ 810.580970][ T2840] [ 810.583467][ T2840] CPU: 0 PID: 2840 Comm: systemd-journal Not tainted 5.16.0-rc3-syzkaller #0 [ 810.592257][ T2840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 810.602332][ T2840] ===================================================== [ 810.609267][ T2840] Disabling lock debugging due to kernel taint [ 810.620127][ T2840] Kernel panic - not syncing: kmsan.panic set ... [ 810.626576][ T2840] CPU: 0 PID: 2840 Comm: systemd-journal Tainted: G B 5.16.0-rc3-syzkaller #0 [ 810.636864][ T2840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 810.646949][ T2840] Call Trace: [ 810.650254][ T2840] [ 810.653210][ T2840] dump_stack_lvl+0x1ff/0x28e [ 810.657945][ T2840] dump_stack+0x25/0x28 [ 810.662145][ T2840] panic+0x467/0xe03 [ 810.666164][ T2840] ? add_taint+0x187/0x210 [ 810.670705][ T2840] ? _raw_spin_unlock_irqrestore+0x78/0xb0 [ 810.676578][ T2840] kmsan_report+0x306/0x310 [ 810.681142][ T2840] ? _raw_spin_unlock_irqrestore+0x78/0xb0 [ 810.686997][ T2840] ? __msan_warning+0xb8/0x130 [ 810.691805][ T2840] ? string+0x3d2/0x700 [ 810.696010][ T2840] ? vsnprintf+0x224f/0x36a0 [ 810.700650][ T2840] ? scnprintf+0x23c/0x340 [ 810.705114][ T2840] ? devkmsg_read+0x6d1/0x1170 [ 810.709922][ T2840] ? vfs_read+0x6c8/0x1980 [ 810.714370][ T2840] ? ksys_read+0x28c/0x520 [ 810.718813][ T2840] ? __x64_sys_read+0xdb/0x120 [ 810.723610][ T2840] ? do_syscall_64+0x54/0xd0 [ 810.728231][ T2840] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 810.734354][ T2840] ? kmsan_internal_chain_origin+0xf5/0x110 [ 810.740292][ T2840] ? kmsan_internal_chain_origin+0xab/0x110 [ 810.746230][ T2840] ? __msan_chain_origin+0xbf/0x140 [ 810.751471][ T2840] ? vsnprintf+0x33d6/0x36a0 [ 810.756194][ T2840] ? scnprintf+0x23c/0x340 [ 810.760649][ T2840] ? devkmsg_read+0x6d1/0x1170 [ 810.765537][ T2840] ? vfs_read+0x6c8/0x1980 [ 810.769983][ T2840] ? ksys_read+0x28c/0x520 [ 810.774435][ T2840] ? __x64_sys_read+0xdb/0x120 [ 810.779247][ T2840] ? do_syscall_64+0x54/0xd0 [ 810.783871][ T2840] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 810.790090][ T2840] ? kmsan_get_metadata+0xa4/0x120 [ 810.795244][ T2840] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 810.801099][ T2840] ? kmsan_get_metadata+0xa4/0x120 [ 810.806252][ T2840] ? kmsan_internal_set_shadow_origin+0x63/0xc0 [ 810.812548][ T2840] ? kmsan_get_metadata+0xa4/0x120 [ 810.817700][ T2840] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 810.823555][ T2840] __msan_warning+0xb8/0x130 [ 810.828183][ T2840] string+0x3d2/0x700 [ 810.832209][ T2840] ? kmsan_get_metadata+0xa4/0x120 [ 810.837369][ T2840] vsnprintf+0x224f/0x36a0 [ 810.841846][ T2840] scnprintf+0x23c/0x340 [ 810.846153][ T2840] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 810.852010][ T2840] devkmsg_read+0x6d1/0x1170 [ 810.856748][ T2840] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 810.862598][ T2840] ? devkmsg_llseek+0x340/0x340 [ 810.867491][ T2840] ? devkmsg_llseek+0x340/0x340 [ 810.872384][ T2840] vfs_read+0x6c8/0x1980 [ 810.876674][ T2840] ? kmsan_get_metadata+0xa4/0x120 [ 810.882002][ T2840] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 810.887952][ T2840] ksys_read+0x28c/0x520 [ 810.892245][ T2840] __x64_sys_read+0xdb/0x120 [ 810.896877][ T2840] do_syscall_64+0x54/0xd0 [ 810.901330][ T2840] ? irqentry_exit+0x12/0x40 [ 810.906053][ T2840] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 810.911999][ T2840] RIP: 0033:0x7fbc02f25210 [ 810.916457][ T2840] Code: 73 01 c3 48 8b 0d 98 7d 20 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d b9 c1 20 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 4e fc ff ff 48 89 04 24 [ 810.936281][ T2840] RSP: 002b:00007ffc2d2ac8c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 810.944728][ T2840] RAX: ffffffffffffffda RBX: 00007ffc2d2af340 RCX: 00007fbc02f25210 [ 810.952726][ T2840] RDX: 0000000000002000 RSI: 00007ffc2d2ad140 RDI: 0000000000000009 [ 810.960754][ T2840] RBP: 0000000000000000 R08: 0000000000000008 R09: 000055efc6b3b7b8 [ 810.968747][ T2840] R10: 000055efc6b3b780 R11: 0000000000000246 R12: 00007ffc2d2ad140 [ 810.976751][ T2840] R13: 00007ffc2d2af298 R14: 000055efc5ffb958 R15: 0005d30bedad3f20 [ 810.984761][ T2840] [ 810.987854][ T2840] Kernel Offset: disabled [ 810.992182][ T2840] Rebooting in 86400 seconds..