318454896328bcbb882b8d29b0a52ee122ee37514", 0x81}, {&(0x7f00000002c0)="3cd723b82355ed9f78cda5c2bf7ee6b9e733a0427ae2272c0729a2e9e28b2beae4b862c9ac320d4151dcd3cae35dd3985b6e2d0687f94a8757bb22c4b8c226adc39db9d2d78cb80d28e4c482c5fac2bd579aecaee505da13b3b5b81c7b10cf2fe27b946272df15372e8b92030feed43d801703f0e2e294744679b7e47f8192f8e25a8f34056543a8c62085ec075aec0361faaa23ae15a9d4a27b0a7b3f8166b06e9cac393be19df4c2ad6da539178f298b51fa930c0f857b1ea6b1ef04297c59e6942e026e04999113d0045d8acc9a0a79c7d88d5b3317ad6df145b4b2da950413c6559b7ff59d9a3bb1b4ae6c", 0xed}, {&(0x7f00000003c0)="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", 0xfb}, {&(0x7f00000004c0)="3e0f7cd9ba47b15c56009123eb3624fbf1baff3929c78e3d0fce22c4eb5d57bbc11229ff26c82b07318af5123ab808fc2d20f3156ca59863c3e8ea26087c996e0d9d512bff9681a62896a6168aed48d32c341a1754dc22e910ccedbd13f37bf9e7ff1c8a5d146099c0f15f58997f32a3807f420fb6cdd336cf433ce7cf5f90b9ca071c30d3cd1bb3d30e5959639a8a", 0x8f}], 0x5}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000001340)="4e324e86e7f1212cbbb5b73f49ed5307d3fedab69efb6ce660e93d418c5e8fe8eb0b6e1dd593c19f70a1c573793d5d136b149d749b6ba2b23a2dd82daf0707fc5be02aecd0700042d3ee595df7003434f11c2bcba8ac133442085e9e7290eba5709ef96af55b7cd542abaf9c2948a8a837e7e91b986ab34f4798147b686a2b7cf79f6ccc71f3dd9fa9bbe1991c5d55d5c9a1806ae144b8bdc8395a4b56e6664579f67c24259bd10b387ca203577833308a386e1169cb69c1b307d1eed3175b45c6766b60", 0xc4}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7509bf746bec66ba", 0x20c8, 0x11, 0x0, 0x27) 20:06:28 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0x89b, 0x8, 0x9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0xc, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="850000002f000000186600000c00000000000000ffffff7f182800", @ANYRES32, @ANYBLOB="00000000460c0000183b00000500000000b70000004fedc251a3f14e152706fdf4cb0bc6c7703ec6884055fb037219425c1faf88382555aaa9da897f104c99ded2c00ad9c3ded4f71cdbdbc44800260d9acd622629073530fad4a315e224461f7982f2356613bff6fed48ae7c348257af2dd1a9828c07e5c7be9b9ba16a6f4c1685e3f761785"], &(0x7f0000000400)='syzkaller\x00', 0x401, 0xff, &(0x7f0000000440)=""/255, 0x41000, 0x1, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x2, 0x0, 0x1, 0x7fff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001700)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1b, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000d9500000000000059eb00000d4af4fffcffffff8500000088000000182a0000", @ANYRES32, @ANYBLOB="0800000004000002858b01d0abc60000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa7, &(0x7f0000000540)=""/167, 0x41000, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000000800)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x24}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) listen(0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r6}, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000001700)={0x0, 0x0, {0x0, @struct}, {0x0, @struct}, {0x0, @struct}}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r8, 0x4004662b, &(0x7f0000000000)=0x2) socket$nl_generic(0x10, 0x3, 0x10) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000780)=0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1c, 0x6, &(0x7f0000000140)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x2}, @alu={0xd88cfd661e1cd955, 0x0, 0xd, 0x6, 0x0, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_fd={0x18, 0x9}], &(0x7f0000000280)='syzkaller\x00', 0x4b, 0x66, &(0x7f0000000840)=""/102, 0x41100, 0x1c, '\x00', r5, 0x1, r2, 0x8, &(0x7f0000000640)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x3, 0x2, 0x7, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[r2, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 20:06:28 executing program 4: getresgid(&(0x7f0000000180), &(0x7f00000001c0), 0x0) [ 348.531324][ T6583] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 348.709304][ T6574] device veth0_vlan left promiscuous mode [ 348.836859][ T6574] device veth0_vlan entered promiscuous mode [ 348.844110][ T6574] device veth1_macvtap left promiscuous mode [ 348.851052][ T6574] device veth1_macvtap entered promiscuous mode [ 348.858646][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 348.868212][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:06:29 executing program 4: syz_clone(0x20380000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 20:06:29 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getdents64(r0, &(0x7f0000000200)=""/207, 0xcf) 20:06:29 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0x89b, 0x8, 0x9}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0xc, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="850000002f000000186600000c00000000000000ffffff7f182800", @ANYRES32, @ANYBLOB="00000000460c0000183b00000500000000b70000004fedc251a3f14e152706fdf4cb0bc6c7703ec6884055fb037219425c1faf88382555aaa9da897f104c99ded2c00ad9c3ded4f71cdbdbc44800260d9acd622629073530fad4a315e224461f7982f2356613bff6fed48ae7c348257af2dd1a9828c07e5c7be9b9ba16a6f4c1685e3f761785"], &(0x7f0000000400)='syzkaller\x00', 0x401, 0xff, &(0x7f0000000440)=""/255, 0x41000, 0x1, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x2, 0x0, 0x1, 0x7fff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001700)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1b, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000d9500000000000059eb00000d4af4fffcffffff8500000088000000182a0000", @ANYRES32, @ANYBLOB="0800000004000002858b01d0abc60000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa7, &(0x7f0000000540)=""/167, 0x41000, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000000800)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x24}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) listen(0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r6}, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000001700)={0x0, 0x0, {0x0, @struct}, {0x0, @struct}, {0x0, @struct}}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r8, 0x4004662b, &(0x7f0000000000)=0x2) socket$nl_generic(0x10, 0x3, 0x10) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000780)=0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1c, 0x6, &(0x7f0000000140)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x2}, @alu={0xd88cfd661e1cd955, 0x0, 0xd, 0x6, 0x0, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_fd={0x18, 0x9}], &(0x7f0000000280)='syzkaller\x00', 0x4b, 0x66, &(0x7f0000000840)=""/102, 0x41100, 0x1c, '\x00', r5, 0x1, r2, 0x8, &(0x7f0000000640)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x3, 0x2, 0x7, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[r2, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 20:06:29 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:29 executing program 2: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0x80000000) [ 348.883713][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 348.892232][ T4740] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.899158][ T4740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.914609][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 348.929511][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 20:06:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @private=0xa010101}, 0x10) 20:06:29 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) utimensat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 348.944281][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 348.964788][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 348.986105][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 20:06:29 executing program 0: open(0x0, 0x80000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x3a, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 20:06:29 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x304540, 0x0) 20:06:29 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 20:06:29 executing program 2: syz_clone(0x2a081000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 348.998224][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 349.011640][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 349.032381][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 20:06:29 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x400000, 0x0) 20:06:29 executing program 4: pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0) 20:06:29 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000002180)='.pending_reads\x00', 0x240, 0x0) read$FUSE(r0, 0x0, 0x0) [ 349.091995][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 349.112879][ T6609] loop5: detected capacity change from 0 to 2048 [ 349.123784][ T6598] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 349.123922][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 349.156683][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 349.165317][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 349.174053][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 349.193455][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 349.256057][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 349.359945][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 349.368208][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 349.378632][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.392029][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 349.400204][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 20:06:30 executing program 1: syz_clone(0x58020000, 0x0, 0xffffffe2, 0x0, 0x0, 0x0) [ 349.408571][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 349.417068][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 349.425033][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 349.439091][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 349.448770][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 20:06:30 executing program 2: write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) clock_gettime(0x0, &(0x7f0000001280)) 20:06:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000000)='|', 0x1) 20:06:30 executing program 1: mknodat$loop(0xffffffffffffffff, &(0x7f0000005d00)='./file0\x00', 0x0, 0x0) 20:06:30 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8000, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs$userns(r0, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) syz_open_procfs$userns(r1, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wg2\x00'}) [ 349.456448][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 349.464475][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 349.472579][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 349.484291][ T6609] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 349.498461][ T6609] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:30 executing program 0: open(0x0, 0x80000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x3a, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) syz_clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 20:06:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:30 executing program 2: syz_mount_image$fuse(&(0x7f0000003d40), &(0x7f0000003d80)='./file0\x00', 0x0, &(0x7f0000003dc0)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}, 0x0, 0x0, 0x0) 20:06:30 executing program 1: clock_gettime(0x0, &(0x7f0000001280)) 20:06:30 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_open_procfs$userns(0x0, &(0x7f0000000000)) 20:06:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000300)={'wg2\x00'}) 20:06:30 executing program 1: syz_clone(0x9080500, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 20:06:30 executing program 4: sched_rr_get_interval(0x0, 0x0) clock_nanosleep(0x1, 0x1, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 20:06:30 executing program 3: getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 20:06:30 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x204200, 0x0) 20:06:30 executing program 3: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 20:06:30 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_CTL_ADD(r0, 0xc1086201, 0x0) [ 349.929798][ T6649] fuse: Bad value for 'fd' [ 350.282576][ T6672] loop5: detected capacity change from 0 to 2048 [ 350.406667][ T6671] device veth0_vlan left promiscuous mode [ 350.412546][ T6671] device veth0_vlan entered promiscuous mode [ 350.419767][ T6671] device veth1_macvtap left promiscuous mode [ 350.427011][ T6671] device veth1_macvtap entered promiscuous mode [ 350.434746][ T6672] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 20:06:31 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) 20:06:31 executing program 2: getrandom(&(0x7f0000000080)=""/81, 0x51, 0x1) 20:06:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "5343216bbe6979f7d66b24f2be4d6dfd208f70"}) 20:06:31 executing program 1: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000002a40)=ANY=[], 0x1f) 20:06:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) syz_open_pts(r1, 0x0) 20:06:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) 20:06:31 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 20:06:31 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, 0x0) 20:06:31 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$P9_RLINK(r0, 0x0, 0xfffffffffffffe92) 20:06:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x530, 0x158, 0x358, 0x0, 0x0, 0x0, 0x540, 0x540, 0x540, 0x540, 0x540, 0x6, 0x0, {[{{@ipv6={@private2, @private1, [], [], 'pimreg0\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev, [], [], 'vcan0\x00', 'ip6gretap0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private0, [], [], 'tunl0\x00', 'team_slave_1\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@empty}}}, {{@ipv6={@private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) 20:06:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:31 executing program 4: pipe2$9p(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_ROPEN(r0, 0x0, 0x0) 20:06:31 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 20:06:31 executing program 1: pipe2$9p(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 20:06:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000002340)) 20:06:31 executing program 0: getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) setresuid(0x0, r0, 0x0) 20:06:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000080)) 20:06:31 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, 0x0, &(0x7f00000000c0)) 20:06:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x4b72, 0x0) 20:06:31 executing program 2: setgroups(0x2, &(0x7f0000000180)=[0x0, 0x0]) getgroups(0x1, &(0x7f00000001c0)=[0x0]) 20:06:31 executing program 0: pipe2$9p(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWRITE(r0, 0x0, 0x0) [ 350.990254][ T6717] loop5: detected capacity change from 0 to 2048 [ 351.050065][ T6717] device veth0_vlan left promiscuous mode [ 351.056299][ T6717] device veth0_vlan entered promiscuous mode [ 351.065844][ T6717] device veth1_macvtap left promiscuous mode [ 351.074395][ T6717] device veth1_macvtap entered promiscuous mode [ 351.083518][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 351.090943][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 351.098908][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 351.110947][ T459] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.117833][ T459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.125566][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 351.133798][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 351.142129][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 351.150489][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 351.158576][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 351.166736][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 351.174654][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 351.182849][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 351.190904][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 351.199059][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 351.207135][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 351.215195][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 351.223481][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 351.231814][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 351.240051][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 351.248357][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 351.257720][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 351.265504][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 351.273413][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 351.281283][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 351.289420][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 351.297507][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.305321][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 351.313323][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 351.320625][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.327925][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 351.335955][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 351.344044][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 351.351579][ T6718] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 351.365648][ T6718] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, 0x0) 20:06:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, 0x0) 20:06:32 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r0, 0x0, 0x0) 20:06:32 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) 20:06:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f00000010c0)={0x0, 0x0, 0x0}, 0x0) 20:06:32 executing program 3: ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0xffffffffffffffff) 20:06:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) syz_open_pts(r0, 0x48a001) 20:06:32 executing program 4: r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000180)) 20:06:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$VT_GETMODE(r0, 0x5601, 0x0) 20:06:32 executing program 3: memfd_create(&(0x7f0000000040)='/\xdb:}%\xf0^!//\x00', 0x3) 20:06:32 executing program 0: pipe2$9p(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 20:06:32 executing program 4: pipe2$9p(&(0x7f0000004180), 0x80800) 20:06:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 20:06:32 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) 20:06:32 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x8001, 0x0) [ 351.896855][ T6753] loop5: detected capacity change from 0 to 2048 [ 351.965193][ T6753] device veth0_vlan left promiscuous mode [ 351.971691][ T6753] device veth0_vlan entered promiscuous mode [ 351.982273][ T6753] device veth1_macvtap left promiscuous mode [ 351.992061][ T6753] device veth1_macvtap entered promiscuous mode [ 352.001425][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 352.009084][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.019673][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.029148][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.036014][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.043470][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 352.051846][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 352.060185][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 352.068527][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 352.076468][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 352.084880][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 352.093032][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 352.101258][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 352.109375][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 352.117578][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 352.125619][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 352.133849][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 352.142234][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 352.150812][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 352.159102][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 352.167485][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 352.175369][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 352.183548][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 352.191679][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 352.199810][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 352.208372][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 352.216802][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 352.224741][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 352.232836][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 352.240449][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 352.248096][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 352.257617][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 352.265604][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 352.273089][ T6754] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 352.286863][ T6754] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, 0x0) 20:06:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) 20:06:33 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x400, 0x0) 20:06:33 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0x300000d9) 20:06:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$KDGKBENT(r0, 0x4b46, 0x0) 20:06:33 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, 0x0, 0xffffffffffffff8d) 20:06:33 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) 20:06:33 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r0, 0x0, 0x0) 20:06:33 executing program 3: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) 20:06:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, 0x0) 20:06:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, 0x0) [ 352.805504][ T6782] loop5: detected capacity change from 0 to 2048 [ 352.843675][ T6782] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.850563][ T6782] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.879417][ T6782] device veth0_vlan left promiscuous mode [ 352.886009][ T6782] device veth0_vlan entered promiscuous mode [ 352.896363][ T6782] device veth1_macvtap left promiscuous mode [ 352.905258][ T6782] device veth1_macvtap entered promiscuous mode [ 352.914868][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 352.922417][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.930158][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 352.942505][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 352.950833][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 352.958950][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 352.967091][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 352.975157][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 352.983261][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 352.992888][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 353.001110][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.008984][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.016959][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 353.025058][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 353.033091][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 353.041203][ T6783] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 353.055419][ T6783] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:34 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 20:06:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, 0x0) 20:06:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) 20:06:34 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_LK(r0, 0x0, 0x0) 20:06:34 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) 20:06:34 executing program 2: r0 = getuid() setresuid(r0, 0x0, 0x0) 20:06:34 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000001c0), 0x2, 0x0) 20:06:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, 0x0) 20:06:34 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r0, 0x0, 0x0) 20:06:34 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x155142, 0x0) 20:06:34 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) [ 353.710357][ T6811] loop5: detected capacity change from 0 to 2048 [ 353.752053][ T6811] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.759661][ T6811] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.792157][ T6811] device veth0_vlan left promiscuous mode [ 353.798959][ T6811] device veth0_vlan entered promiscuous mode [ 353.810035][ T6811] device veth1_macvtap left promiscuous mode [ 353.819465][ T6811] device veth1_macvtap entered promiscuous mode [ 353.830802][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 353.838812][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.849825][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 353.858457][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 353.866765][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 353.874899][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 353.883192][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 353.891447][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 353.899593][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 353.907889][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 353.916130][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.924166][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.932256][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 353.941316][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 353.950801][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 353.959085][ T6812] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 353.972449][ T6812] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:35 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x53fe81, 0x0) 20:06:35 executing program 2: getrandom(&(0x7f0000000040)=""/156, 0x9c, 0x3) 20:06:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TCSETAF(r0, 0x5408, 0x0) 20:06:35 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBMETA(r0, 0x4b62, 0x0) 20:06:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 20:06:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) syz_open_pts(r0, 0x246000) 20:06:35 executing program 0: pipe(&(0x7f00000063c0)) 20:06:35 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x240201, 0x0) 20:06:35 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000280), 0x480100, 0x0) 20:06:35 executing program 3: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x1000}, &(0x7f0000000100)) 20:06:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000002040)='net/psched\x00') read$FUSE(r0, &(0x7f0000002e00)={0x2020}, 0x23) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 20:06:35 executing program 2: write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x1f, 0x2, 0x200}, 0xf) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x13, 0x1, {0x10, 0x1, 0x5}}, 0x14) r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x5, 0x212400) r1 = socket$inet_udp(0x2, 0x2, 0x0) accept$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev}, &(0x7f0000000100)=0x10) accept$inet(r0, &(0x7f0000000140)={0x2, 0x0, @dev}, &(0x7f0000000180)=0x10) ioctl$UFFDIO_CONTINUE(r0, 0xc020aa07, &(0x7f00000001c0)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000200)={0x3f, [0x447, 0x35], 0x4}, 0x10) socket$igmp(0x2, 0x3, 0x2) ioctl$RTC_WIE_OFF(r0, 0x7010) r2 = openat$cgroup_ro(r0, &(0x7f0000000240)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x400}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008040}, 0x20008805) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000000380)={0x1, 0x6662, "92ea16", 0x2, 0x4}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x42, 0x0) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000400)={0x0, 0x6, "942b24", 0x8, 0x57}) pipe2$9p(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc4800) write$P9_RLERRORu(r5, &(0x7f0000000480)={0xf, 0x7, 0x2, {{0x2, '+%'}}}, 0xf) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r6, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x6004a00}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x24, 0x0, 0x2, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffa}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8091) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r7, 0x0, 0x3, &(0x7f0000000600)=0xfb89, 0x4) ioctl$RTC_WIE_OFF(r2, 0x7010) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x40102, 0x0) r8 = io_uring_setup(0x149a, &(0x7f0000000680)={0x0, 0x50ad, 0x2, 0x1, 0x3ac, 0x0, r0}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000001, 0x8010, r8, 0x8000000) bind$packet(r0, &(0x7f0000000700)={0x11, 0x1a, 0x0, 0x1, 0x4, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x39}}, 0x14) io_uring_setup(0x75, &(0x7f0000000740)={0x0, 0x85c6, 0x80, 0x0, 0x63, 0x0, r6}) 20:06:35 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) 20:06:35 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x28040, 0x0) 20:06:35 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000005780)={[{@lazytime}, {@noinline_xattr}, {@lazytime}, {@nobarrier}, {@four_active_logs}, {@data_flush}, {@lfs_mode}, {@six_active_logs}]}, 0x1, 0x54e6, &(0x7f0000000140)="$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") r0 = open(&(0x7f0000000040)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000007f80)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 354.527670][ T30] audit: type=1400 audit(1686427595.116:230): avc: denied { accept } for pid=6835 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 354.672884][ T6849] loop5: detected capacity change from 0 to 2048 [ 354.719329][ T6845] loop3: detected capacity change from 0 to 40427 [ 354.753486][ T6849] device veth0_vlan left promiscuous mode [ 354.760194][ T6849] device veth0_vlan entered promiscuous mode [ 354.767442][ T6845] F2FS-fs (loop3): Found nat_bits in checkpoint [ 354.768000][ T6849] device veth1_macvtap left promiscuous mode [ 354.782185][ T6849] device veth1_macvtap entered promiscuous mode [ 354.789172][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 354.796453][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.806797][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.815674][ T4740] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.818645][ T6845] F2FS-fs (loop3): Mounted with checkpoint version = 48b305e5 [ 354.822528][ T4740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.837536][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 354.854129][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.862907][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 354.871341][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 354.879556][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 354.887921][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 354.895842][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 354.904133][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 354.912298][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 354.927016][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 354.940329][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 354.958628][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 354.976571][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 354.984751][ T460] handle_bad_sector: 11 callbacks suppressed [ 354.984771][ T460] attempt to access beyond end of device [ 354.984771][ T460] loop3: rw=2049, want=45104, limit=40427 [ 354.984911][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 355.022330][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 355.030832][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 355.038735][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 355.046798][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.054759][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 355.062781][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 355.070973][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 355.079252][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.087056][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 355.094844][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 355.116927][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 355.124356][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 355.144316][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 355.152509][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 355.159986][ T6851] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 355.177669][ T6851] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:35 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sysvipc/msg\x00', 0x0, 0x0) 20:06:35 executing program 0: r0 = openat$kvm(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 20:06:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:35 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000005780)={[{@lazytime}, {@noinline_xattr}, {@lazytime}, {@nobarrier}, {@four_active_logs}, {@data_flush}, {@lfs_mode}, {@six_active_logs}]}, 0x1, 0x54e6, &(0x7f0000000140)="$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") r0 = open(&(0x7f0000000040)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000007f80)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:06:35 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x14}, 0x14}}, 0x0) 20:06:36 executing program 4: request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0) 20:06:36 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 20:06:36 executing program 4: syz_clone(0x42002000, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:36 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20002, 0x0) 20:06:36 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x404880, 0x0) 20:06:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x20042, 0x0) mount(&(0x7f0000000380)=@sr0, &(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, 0x0) 20:06:36 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netstat\x00') mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 355.550598][ T30] audit: type=1400 audit(1686427596.136:231): avc: denied { mount } for pid=6891 comm="syz-executor.0" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 355.620210][ T6886] loop5: detected capacity change from 0 to 2048 [ 355.715302][ T6859] loop3: detected capacity change from 0 to 40427 [ 355.747344][ T6859] F2FS-fs (loop3): Found nat_bits in checkpoint [ 355.805858][ T6859] F2FS-fs (loop3): Mounted with checkpoint version = 48b305e5 [ 356.056567][ T460] attempt to access beyond end of device [ 356.056567][ T460] loop3: rw=2049, want=45104, limit=40427 [ 356.364811][ T6880] device bridge_slave_1 left promiscuous mode [ 356.377051][ T6880] device veth0_vlan left promiscuous mode [ 356.382952][ T6880] device veth0_vlan entered promiscuous mode [ 356.392017][ T6880] device veth1_macvtap left promiscuous mode [ 356.398603][ T6880] device veth1_macvtap entered promiscuous mode [ 356.435829][ T6886] device veth0_vlan left promiscuous mode [ 356.441831][ T6886] device veth0_vlan entered promiscuous mode [ 356.449035][ T6886] device veth1_macvtap left promiscuous mode [ 356.455978][ T6886] device veth1_macvtap entered promiscuous mode [ 356.479710][ T6883] device veth0_vlan left promiscuous mode [ 356.485486][ T6883] device veth1_macvtap left promiscuous mode [ 356.491974][ T6883] device veth1_macvtap entered promiscuous mode [ 356.498451][ T6883] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 356.513715][ T6887] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 20:06:37 executing program 0: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1000, &(0x7f00000000c0)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) 20:06:37 executing program 3: syz_clone(0x10500100, 0x0, 0x0, &(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)='U') [ 356.539988][ T6898] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 356.574220][ T6890] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 20:06:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x20042, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f00000000c0)='./file0\x00') sendfile(r1, r0, 0x0, 0x20000008000005) 20:06:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) io_submit(0x0, 0x1, &(0x7f0000000b00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000000)="bcb9", 0x2}]) 20:06:37 executing program 3: syz_clone(0x10500100, 0x0, 0x0, &(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)='U') 20:06:37 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='auxv\x00') read$char_usb(r0, &(0x7f0000000000)=""/168, 0xa8) 20:06:37 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='auxv\x00') write$char_usb(r0, 0x0, 0x0) 20:06:37 executing program 3: syz_clone(0x10500100, 0x0, 0x0, &(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)='U') 20:06:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) io_submit(0x0, 0x1, &(0x7f0000000b00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000000)="bc", 0x1}]) 20:06:37 executing program 3: syz_clone(0x10500100, 0x0, 0x0, &(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)='U') 20:06:37 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 356.771016][ T6940] loop5: detected capacity change from 0 to 2048 [ 356.854732][ T6940] device veth0_vlan left promiscuous mode [ 356.874339][ T6940] device veth0_vlan entered promiscuous mode [ 356.892598][ T6940] device veth1_macvtap left promiscuous mode [ 356.913467][ T6940] device veth1_macvtap entered promiscuous mode [ 356.933688][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.941132][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.960028][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.976083][ T505] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.982982][ T505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.005500][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.021359][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.038185][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.055248][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 357.071954][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 357.089837][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 357.106682][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 357.124451][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 357.143769][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 357.160483][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 357.177101][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 357.193818][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 357.210631][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 357.227518][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 357.255053][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 357.270569][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.284062][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 357.297518][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.312277][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 357.330008][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 357.346209][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 357.362599][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 357.378278][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 357.394831][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 357.408839][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 357.425127][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 357.443043][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 357.458749][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 357.487768][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.501806][ T6943] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 357.557993][ T6943] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.599698][ T6945] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 357.616292][ T6946] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 20:06:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) [ 357.645810][ T6942] device veth1_macvtap left promiscuous mode [ 357.652023][ T6942] device veth1_macvtap entered promiscuous mode [ 357.660908][ T6942] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. 20:06:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:38 executing program 0: socket(0x0, 0xba86cc88c291ff94, 0x0) 20:06:38 executing program 3: syz_mount_image$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10}, 0x10) 20:06:38 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) io_submit(0x0, 0x1, &(0x7f0000000b00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000000)="bcb9132e02d57d", 0x7}]) [ 357.694598][ T6941] device veth0_vlan left promiscuous mode [ 357.700362][ T6941] device veth0_vlan entered promiscuous mode [ 357.707079][ T6941] device veth1_macvtap left promiscuous mode [ 357.713293][ T6941] device veth1_macvtap entered promiscuous mode [ 357.725376][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 357.733600][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:06:38 executing program 3: getgroups(0x1, &(0x7f0000002080)=[0xee01]) 20:06:38 executing program 4: syz_clone(0x10500100, 0x0, 0x0, &(0x7f0000001940), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000002c40), &(0x7f0000002c80), &(0x7f0000002cc0)) 20:06:38 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f00000028c0)={&(0x7f0000002880)='./file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000003000)={&(0x7f0000002fc0)='./file0\x00'}, 0x10) [ 357.759805][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.775412][ T637] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.782315][ T637] bridge0: port 1(bridge_slave_0) entered forwarding state 20:06:38 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x11, 0x4, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x20) 20:06:38 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000011c0)='ns/time_for_children\x00') [ 357.812716][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.829720][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.870300][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.894806][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 357.926177][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 357.958674][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 357.981199][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 358.012728][ T6983] loop5: detected capacity change from 0 to 2048 [ 358.019325][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 358.031582][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 358.054365][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 358.077763][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 358.085977][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 358.120521][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 358.143886][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 358.165854][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 358.188881][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 358.212469][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 358.234473][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 358.257375][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 358.275632][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 358.297499][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 358.306962][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 358.314755][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 358.350318][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 358.375242][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 358.393813][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 358.412051][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.426730][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.435165][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 358.443638][ T637] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.450501][ T637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.458000][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 358.466146][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 358.474603][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 358.482938][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 358.490990][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 358.499311][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 358.507348][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 358.515396][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 358.523525][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 358.531868][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 358.540286][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 358.548581][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 358.556885][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 358.565038][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 358.573449][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 358.586917][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 358.594708][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 358.607043][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 358.615407][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 358.623617][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 358.632322][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 358.640894][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 358.649288][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 358.657409][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 358.664692][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 358.672222][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 358.680610][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 358.688719][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 358.700540][ T6970] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 358.715836][ T6984] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 358.730279][ T6984] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:39 executing program 2: syz_btf_id_by_name$bpf_lsm(&(0x7f0000000100)='bpf_lsm_cred_prepare\x00') [ 358.754856][ T6986] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 358.772415][ T6986] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f00000003c0)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 20:06:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x0, 0x0, 0x0, 0x15a4, 0x1}, 0x48) 20:06:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) io_submit(0x0, 0x1, &(0x7f0000000b00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x0, r0, 0x0}]) 20:06:39 executing program 3: pipe2$9p(&(0x7f0000003200), 0x0) [ 358.795578][ T6987] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 20:06:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x81000000}, 0x0) 20:06:39 executing program 0: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x1, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map, r0}, 0x14) 20:06:39 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xf, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) 20:06:39 executing program 1: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) [ 358.845648][ T6983] device veth0_vlan left promiscuous mode [ 358.852258][ T6983] device veth0_vlan entered promiscuous mode [ 358.858971][ T6983] device veth1_macvtap left promiscuous mode [ 358.865774][ T6983] device veth1_macvtap entered promiscuous mode [ 358.872671][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.880109][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.887548][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 20:06:39 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000001740)={&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000000400)="d1", 0x1}, {&(0x7f0000000440)='H', 0x1}, {0x0}], 0x3, &(0x7f0000001700)=[@rights={{0x18, 0x1, 0x1, [r2, r0]}}], 0x18}, 0x0) 20:06:39 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$watch_queue(r0, 0x0, 0x0) 20:06:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x17) 20:06:39 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@cgroup, 0xffffffffffffffff, 0xa}, 0x10) [ 358.904744][ T637] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.911648][ T637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.929196][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 20:06:39 executing program 4: getitimer(0xcb18b3e937d8b138, 0x0) 20:06:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, &(0x7f00000002c0)=""/180, 0x1a, 0xb4, 0x1}, 0x20) [ 358.942161][ T30] audit: type=1400 audit(1686427599.526:232): avc: denied { sys_module } for pid=7015 comm="syz-executor.3" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 358.945831][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 358.989191][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 359.006187][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 359.014353][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 359.022585][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 359.031486][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 359.046937][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 359.055540][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 359.063811][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 359.071979][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 359.080157][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 359.092708][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 359.102912][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 359.116905][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 359.125047][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.135483][ T7027] loop5: detected capacity change from 0 to 2048 [ 359.143186][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 359.151176][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.161023][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 359.169501][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 359.177647][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 359.185766][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.193559][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 359.201407][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.208921][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 359.216436][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 359.236754][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 359.245112][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 359.253953][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.281934][ T7028] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000002c0)=""/180, 0x26, 0xb4, 0x1}, 0x20) 20:06:40 executing program 4: add_key(&(0x7f0000000280)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:06:40 executing program 2: add_key$keyring(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 20:06:40 executing program 3: io_uring_setup(0x121e, &(0x7f0000000000)={0x0, 0x0, 0x2}) 20:06:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000002c0)=""/180, 0x1a, 0xb4, 0x1}, 0x20) 20:06:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x0) 20:06:40 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$clear(0x7, r2) 20:06:40 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x1b, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x1, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x2}]}}, &(0x7f00000002c0)=""/180, 0x26, 0xb4, 0x1}, 0x20) 20:06:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) 20:06:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f000000d100)={&(0x7f000000cfc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x5}]}}, 0x0, 0x26}, 0x20) 20:06:40 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) 20:06:40 executing program 4: add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f00000001c0)="99", 0x1, 0xffffffffffffffff) 20:06:40 executing program 1: capget(0x0, 0x0) syz_open_procfs$userns(0x0, &(0x7f000000c200)) 20:06:40 executing program 2: keyctl$search(0x11, 0x0, 0x0, 0x0, 0x0) [ 360.027426][ T7065] loop5: detected capacity change from 0 to 2048 [ 360.089011][ T7065] device veth0_vlan left promiscuous mode [ 360.095379][ T7065] device veth0_vlan entered promiscuous mode [ 360.102675][ T7065] device veth1_macvtap left promiscuous mode [ 360.112575][ T7065] device veth1_macvtap entered promiscuous mode [ 360.122754][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 360.130266][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.138042][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.150012][ T637] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.156886][ T637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.164507][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 360.172674][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.180665][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 360.188787][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 360.196619][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 360.204486][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 360.212405][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 360.220295][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 360.228145][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 360.236103][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 360.244059][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 360.252006][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 360.260094][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 360.268249][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 360.276196][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 360.284400][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 360.292142][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 360.300103][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 360.308043][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 360.315805][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 360.323936][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 360.332082][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 360.339971][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 360.347668][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 360.354984][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 360.362432][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 360.370355][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 360.378374][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 360.385759][ T7066] validate_nla: 1 callbacks suppressed [ 360.385773][ T7066] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 360.405297][ T7066] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@deltclass={0x2c, 0x29, 0x580d1fe9319d449d, 0x0, 0x0, {}, [@TCA_RATE={0x6, 0xb}]}, 0x2c}}, 0x0) 20:06:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000002740)={0x1, 0x3, &(0x7f0000002540)=@framed, &(0x7f0000002580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x2, &(0x7f0000000040)=@raw=[@kfunc, @func], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:41 executing program 4: bpf$PROG_LOAD_XDP(0xe, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) 20:06:41 executing program 2: eventfd2(0x0, 0x400) 20:06:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@deltclass={0x2c, 0x29, 0x580d1fe9319d449d, 0x0, 0x0, {}, [@TCA_RATE={0x6, 0xa}]}, 0x2c}}, 0x0) 20:06:41 executing program 1: bpf$PROG_LOAD_XDP(0x12, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 20:06:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000002c0)=""/180, 0x1a, 0xb4, 0x1}, 0x20) 20:06:41 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000080)=@framed={{0x21}}, &(0x7f00000000c0)='GPL\x00', 0x1, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:41 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000080)=@raw=[@kfunc], &(0x7f0000000000)='syzkaller\x00', 0x1, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:41 executing program 2: add_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='9', 0x1, 0xfffffffffffffffe) [ 360.726331][ T7075] netlink: 'syz-executor.3': attribute type 11 has an invalid length. 20:06:41 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x1, 0xb0, &(0x7f0000000100)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xe00) [ 360.912645][ T7099] loop5: detected capacity change from 0 to 2048 [ 360.997065][ T7099] device veth0_vlan left promiscuous mode [ 361.003299][ T7099] device veth0_vlan entered promiscuous mode [ 361.012896][ T7099] device veth1_macvtap left promiscuous mode [ 361.022026][ T7099] device veth1_macvtap entered promiscuous mode [ 361.029915][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.037299][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.044919][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.053226][ T459] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.060110][ T459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.067385][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.075435][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.083538][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.091660][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 361.099570][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 361.107502][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 361.115283][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 361.123248][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.131239][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.139297][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.147294][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.155246][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 361.163404][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 361.171480][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 361.179640][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 361.187694][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.195374][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.203243][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.211147][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 361.219666][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 361.228062][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 361.236312][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.244262][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 361.252217][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 361.259640][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.266828][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 361.274697][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 361.282737][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 361.290286][ T7100] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 361.303003][ T7100] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:42 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='GPL\x00', 0x1, 0xb4, &(0x7f00000000c0)=""/180, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:42 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002400), 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, 0x0) 20:06:42 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x1, 0xb0, &(0x7f0000000100)=""/176, 0x63000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f000000d100)={&(0x7f000000cfc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 20:06:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r3 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r3, @ANYRESDEC, @ANYRESHEX=r3], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r6, r6, 0xffffffffffffffff, r6, 0xffffffffffffffff]}, 0x80) 20:06:42 executing program 4: keyctl$reject(0x13, 0x0, 0x0, 0xac68, 0x0) 20:06:42 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 20:06:42 executing program 2: socket$inet(0x2, 0x2d66ed141032bf35, 0x0) 20:06:42 executing program 4: ioperm(0x0, 0x9, 0x200) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) 20:06:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x400454d9, &(0x7f00000007c0)) 20:06:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x541b, 0x0) 20:06:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'wg0\x00', 0x1}) 20:06:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ip6tnl0\x00', 0x2}) 20:06:42 executing program 2: syz_clone(0x200000, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000001200), &(0x7f0000001240)="84217cf664170bbccd6cde359d40beb3a2caad4919d4ba0d19eefa4c27a5c29ca8cef881fb304328336bd1456cb1341bdd4f380788852d08dc091f4a9de6cb79cc622ec0d4d7a96f07054a92a6c145ffce2552a42553009216df2353f0be3029ef49eb95c99b495d27d786d8dce5ed734f7e5d0b26e3b5693137213782d4feebb1cc3198f94bea08ee4ad17bce471cbbadb9dd8047") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) 20:06:42 executing program 1: syz_clone(0x200000, &(0x7f0000000200)="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", 0x800, 0x0, 0x0, &(0x7f0000001240)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) 20:06:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x401c5820, 0x0) [ 361.844135][ T7138] loop5: detected capacity change from 0 to 2048 [ 361.889669][ T7138] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.896566][ T7138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.925939][ T7138] device veth0_vlan left promiscuous mode [ 361.933090][ T7138] device veth0_vlan entered promiscuous mode [ 361.944333][ T7138] device veth1_macvtap left promiscuous mode [ 361.954200][ T7138] device veth1_macvtap entered promiscuous mode [ 361.964988][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 361.972591][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.983595][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.992040][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.000699][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 362.008802][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 362.016893][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 362.024931][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 362.033628][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 362.041892][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 362.050940][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.058951][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.067066][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 362.075289][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 362.083540][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 362.091821][ T7139] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 362.119985][ T7139] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r3 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r3, @ANYRESDEC, @ANYRESHEX=r3], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r6, r6, 0xffffffffffffffff, r6, 0xffffffffffffffff]}, 0x80) 20:06:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x3}, {}, {0x0, 0x3}]}]}}, &(0x7f0000000200)=""/183, 0x3e, 0xb7, 0x1}, 0x20) 20:06:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x5460, 0x0) 20:06:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000028c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40) 20:06:43 executing program 0: syz_emit_ethernet(0x23, &(0x7f0000000200)={@broadcast, @local, @val, {@ipv4}}, 0x0) 20:06:43 executing program 1: open(0x0, 0x6b7925ae221563d2, 0x0) 20:06:43 executing program 4: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x3) 20:06:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) 20:06:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f00000000c0)="698ce8642d8fc28f4e6453621151cdde9151cedea040077645f95a1da52fd82c620e9344a2fcbb46928c8705eb45713aa9e8ec91977ccf21cd68d5c0fd1599e7fd02fd499280760a00f3de219632e31dff701f9252", 0x55, 0x8d, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 20:06:43 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x1, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) 20:06:43 executing program 0: mlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 20:06:43 executing program 4: r0 = socket(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={0x10, 0x2}, 0x10) [ 362.750070][ T7167] loop5: detected capacity change from 0 to 2048 [ 362.788167][ T7167] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.795053][ T7167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.825073][ T7167] device veth0_vlan left promiscuous mode [ 362.831766][ T7167] device veth0_vlan entered promiscuous mode [ 362.842660][ T7167] device veth1_macvtap left promiscuous mode [ 362.853604][ T7167] device veth1_macvtap entered promiscuous mode [ 362.864367][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 362.871906][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.882952][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.891335][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.899650][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 362.907664][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 362.915621][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 362.923720][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 362.931685][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 362.939907][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 362.948302][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.956462][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.964568][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 362.972717][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 362.980787][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 362.989097][ T7168] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 363.003570][ T7168] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:44 executing program 1: open(&(0x7f0000000b00)='./file0\x00', 0x200, 0x0) 20:06:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f00000000c0)="698ce8642d8fc28f4e6453621151cdde9151cedea040077645f95a1da52fd82c620e9344a2fcbb46928c8705eb45713aa9e8ec91977ccf21cd68d5c0fd1599e7fd02fd4992", 0x45, 0x0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 20:06:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:44 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x210028b, 0x0) 20:06:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r3 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r3, @ANYRESDEC, @ANYRESHEX=r3], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r6, r6, 0xffffffffffffffff, r6, 0xffffffffffffffff]}, 0x80) 20:06:44 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000080)) 20:06:44 executing program 1: r0 = socket(0x1f, 0x5, 0x2) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2d81) 20:06:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:44 executing program 2: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x81) 20:06:44 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000100)=ANY=[@ANYBLOB="fb182e2b666902e3ff010d9822700fd1a9f287a45723deff03"], 0x1c, 0x0}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001700)={0x0, 0x34, 0x0}, 0x0) 20:06:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x8000, 0x0) 20:06:44 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x31, 0x0, &(0x7f0000000180)) 20:06:44 executing program 2: r0 = syz_io_uring_setup(0x7f20, &(0x7f0000000100), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000540), &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r0, 0x4, &(0x7f0000000200)=[0xffffffffffffffff], 0x1) 20:06:44 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='efs\x00', 0x0, 0x0) 20:06:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:44 executing program 0: r0 = syz_io_uring_setup(0x2f8d, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f00000012c0)={0x1, 0x1, 0x0, &(0x7f0000000100)=[{0x0}], 0x0}, 0x20) [ 363.660726][ T7204] loop5: detected capacity change from 0 to 2048 [ 363.720100][ T7204] device veth0_vlan left promiscuous mode [ 363.726289][ T7204] device veth0_vlan entered promiscuous mode [ 363.733406][ T7204] device veth1_macvtap left promiscuous mode [ 363.742544][ T7204] device veth1_macvtap entered promiscuous mode [ 363.751476][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 363.758849][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 363.766098][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 363.778082][ T505] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.784958][ T505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.792391][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 363.800630][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 363.809101][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 363.817424][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 363.825325][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 363.833348][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 363.841168][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 363.849349][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 363.857244][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 363.865155][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 363.873384][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 363.881706][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 363.889807][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 363.897897][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 363.905841][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 363.913972][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 363.921755][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 363.929652][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 363.937429][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 363.945335][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 363.953530][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 363.961792][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.969619][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 363.977366][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.984621][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.992003][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 363.999930][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 364.007956][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 364.015349][ T7205] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 364.029032][ T7205] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:44 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) mount$9p_tcp(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a89b4b14d3a3e3a, &(0x7f00000001c0)) 20:06:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:44 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='binder\x00', 0x0, 0x0) 20:06:44 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) mount(&(0x7f0000000140)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='ceph\x00', 0x0, 0x0) 20:06:44 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) mount(&(0x7f0000000100)=@nullb, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='qnx4\x00', 0x0, 0x0) 20:06:45 executing program 1: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x0) 20:06:45 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) mount(&(0x7f0000000080)=@nullb, &(0x7f0000001240)='./file0\x00', &(0x7f0000000000)='v7\x00', 0x2, 0x0) 20:06:45 executing program 0: r0 = syz_io_uring_setup(0x7f20, &(0x7f0000000100), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000540), &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r0, 0x9, &(0x7f0000000200), 0x0) 20:06:45 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='gadgetfs\x00', 0x0, 0x0) 20:06:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:45 executing program 4: r0 = syz_io_uring_setup(0x7f20, &(0x7f0000000100), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000540), &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r0, 0x19, &(0x7f0000000200), 0x0) [ 364.582951][ T7232] loop5: detected capacity change from 0 to 2048 [ 364.657006][ T7232] device veth0_vlan left promiscuous mode [ 364.662832][ T7232] device veth0_vlan entered promiscuous mode [ 364.672609][ T7232] device veth1_macvtap left promiscuous mode [ 364.681253][ T7232] device veth1_macvtap entered promiscuous mode [ 364.690442][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 364.697771][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.705031][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 364.717037][ T637] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.723994][ T637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.731260][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 364.739857][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 364.748649][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 364.756928][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 364.764825][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 364.772889][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 364.780888][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 364.788871][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 364.796759][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 364.804611][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 364.812469][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 364.820405][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 364.828475][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 364.836717][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 364.844657][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 364.852773][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 364.860553][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 364.868449][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.876214][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 364.884145][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 364.892472][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 364.900538][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.908360][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 364.916045][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 364.923462][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.930669][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 364.938620][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 364.946623][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 364.953991][ T7233] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 364.969192][ T7233] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:45 executing program 0: syz_io_uring_setup(0x0, &(0x7f00000017c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000001840), &(0x7f0000001880)) 20:06:45 executing program 4: r0 = syz_io_uring_setup(0x7f20, &(0x7f0000000100), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000540), &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r0, 0x5, &(0x7f0000000200), 0x0) 20:06:45 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x0, 0x0) 20:06:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:45 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ext3\x00', 0x0, 0x0) 20:06:45 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0}) 20:06:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:45 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) mount(&(0x7f0000002180)=@loop={'/dev/loop', 0x0}, &(0x7f00000021c0)='./file0\x00', &(0x7f0000000000)='fuseblk\x00', 0x0, 0x0) 20:06:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp0\x00', 0x2}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000040)=0x1) 20:06:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:45 executing program 2: syz_clone(0x28000, &(0x7f0000000040)="3ba39c", 0x3, 0x0, 0x0, &(0x7f00000001c0)="aa") 20:06:45 executing program 4: creat(&(0x7f0000000380)='./file0\x00', 0x0) chmod(&(0x7f0000001940)='./file0\x00', 0x0) 20:06:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) [ 365.325065][ T7248] /dev/loop2: Can't open blockdev 20:06:45 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, 0x0) 20:06:45 executing program 4: creat(&(0x7f0000000380)='./file0\x00', 0x0) chmod(&(0x7f0000001940)='./file0\x00', 0x0) [ 365.487150][ T7269] loop5: detected capacity change from 0 to 2048 [ 365.840072][ T7269] device veth0_vlan left promiscuous mode [ 365.846410][ T7269] device veth0_vlan entered promiscuous mode [ 365.856547][ T7269] device veth1_macvtap left promiscuous mode [ 365.865271][ T7269] device veth1_macvtap entered promiscuous mode [ 365.875690][ T7270] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 20:06:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:46 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) mount(&(0x7f0000000080)=@nullb, &(0x7f0000001240)='./file0\x00', &(0x7f0000000000)='v7\x00', 0x0, 0x0) 20:06:46 executing program 2: r0 = fsopen(&(0x7f0000000040)='qnx6\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 20:06:46 executing program 4: creat(&(0x7f0000000380)='./file0\x00', 0x0) chmod(&(0x7f0000001940)='./file0\x00', 0x0) 20:06:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x81) 20:06:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000022c0)={&(0x7f00000020c0), 0x6e, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000500)='\'', 0x1}], 0x1}, 0x0) 20:06:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:46 executing program 4: creat(&(0x7f0000000380)='./file0\x00', 0x0) chmod(&(0x7f0000001940)='./file0\x00', 0x0) 20:06:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002080)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 20:06:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp0\x00', 0x2}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) 20:06:46 executing program 0: socketpair(0x11, 0x2, 0x300, &(0x7f00000025c0)) [ 366.386393][ T7299] loop5: detected capacity change from 0 to 2048 [ 366.482606][ T7299] device veth0_vlan left promiscuous mode [ 366.488383][ T7299] device veth0_vlan entered promiscuous mode [ 366.494848][ T7299] device veth1_macvtap left promiscuous mode [ 366.501939][ T7299] device veth1_macvtap entered promiscuous mode [ 366.509028][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 366.516245][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 366.523508][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 366.531510][ T505] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.538354][ T505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.545531][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 366.553737][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 366.561737][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 366.569883][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 366.577678][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 366.585525][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 366.593403][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 366.601317][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 366.609227][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 366.617190][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 366.624984][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 366.633055][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 366.641060][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 366.649206][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 366.657212][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 366.665267][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 366.673212][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 366.681037][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 366.688917][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 366.696817][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 366.705065][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 366.713540][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 366.721984][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 366.729931][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 366.737497][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 366.744964][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 366.753139][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 366.761278][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 366.769055][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 366.776815][ T7300] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 366.790548][ T7300] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:47 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x38, &(0x7f0000000040)={{{@in6=@private0, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@local}, 0x0, @in6=@private2}}, 0xe8) 20:06:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340), {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r5, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff]}, 0x80) 20:06:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0xaf, &(0x7f0000000100)=""/175, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:47 executing program 0: r0 = openat$binderfs(0xffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xc, 0x0, &(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x0}) 20:06:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000080), 0x4) 20:06:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000680)={'wlan1\x00'}) 20:06:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:47 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x38, 0x0, 0x0) [ 367.117385][ T7305] binder: 7304:7305 unknown command 0 [ 367.122709][ T30] audit: type=1400 audit(1686427607.706:233): avc: denied { read } for pid=7304 comm="syz-executor.0" name="binder1" dev="binder" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 367.147204][ T7305] binder: 7304:7305 ioctl c0306201 200000c0 returned -22 20:06:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x40049409, 0x0) 20:06:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0xc0189436, 0x0) 20:06:47 executing program 2: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x17, &(0x7f0000000040)={{{@in6=@private0, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@local}, 0x0, @in6=@private2}}, 0xe8) 20:06:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) [ 367.179608][ T30] audit: type=1400 audit(1686427607.706:234): avc: denied { open } for pid=7304 comm="syz-executor.0" path="/dev/binderfs/binder1" dev="binder" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 367.241555][ T30] audit: type=1400 audit(1686427607.706:235): avc: denied { ioctl } for pid=7304 comm="syz-executor.0" path="/dev/binderfs/binder1" dev="binder" ino=14 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 367.357969][ T7328] loop5: detected capacity change from 0 to 2048 [ 367.416295][ T7328] device veth0_vlan left promiscuous mode [ 367.423373][ T7328] device veth0_vlan entered promiscuous mode [ 367.433425][ T7328] device veth1_macvtap left promiscuous mode [ 367.442001][ T7328] device veth1_macvtap entered promiscuous mode [ 367.451126][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 367.458455][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.465675][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.474525][ T637] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.481417][ T637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.488589][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 367.496746][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 367.504707][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 367.512851][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 367.520811][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 367.528757][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 367.536612][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 367.544516][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 367.552434][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 367.560321][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 367.568176][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 367.576043][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 367.584072][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 367.592186][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 367.600307][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 367.608551][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 367.616259][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 367.624162][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 367.632028][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 367.639947][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 367.648059][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 367.656123][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 367.663946][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 367.671713][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 367.679071][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 367.686343][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 367.694515][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 367.702654][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 367.710134][ T7330] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 367.724657][ T7330] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2000002, &(0x7f0000000080)=ANY=[], 0x3, 0x549, &(0x7f00000006c0)="$eJzs3d9vW1cdAPDvvYkTt8uWFfYAE9ACg4Kq2o27VdNetr6A0DQJMfGAeOhC4kahdl1qZyyhEtnfABJIPMGfwAMSD0h74oE3HpF4QEjjAalABWqRQDK61zeZm9qtszg2iz8f6er+OL73+z1Jr8/JsXtPADPrXETsRsRCRLwVEcvF8aRY4rXekr3u/r07aw/u3VlLott98+9JXp4di75zMk8V1yxHxDe+GvGd5NG47e2dG6uNRv12sV/tNG9V29s7Fzebqxv1jfrNWu3KypVLL19+qTa2up5t/vLuVzZf/+Zvfv3p93+/++UfZGktFWX99RinXtVL+3Ey8xHx+nEEm4K5Yr0w5Tz4cNKI+FhEfC6//5djLv/XCQCcZN3ucnSX+/cBgJMuzcfAkrRSjAUsRZpWKr0xvOfidNpotTsXrre2bq73xsqejVJ6fbNRv3Rm8Y/fy3sMpSTbX8nL8vJ8v3Zg/3JEnImIHy+eyvcra63G+vS6PQAw05460P7/a7HX/o9gwKd6AMBHRnnaCQAAE6f9B4DZo/0HgNkzQvtffNi/e+y5AACT4e9/AJg92n8AmD3afwCYKV9/441s6T4onn+9/vb21o3W2xfX6+0blebWWmWtdftWZaPV2sif2dN80vUardatlRdj651qp97uVNvbO9eara2bnWv5c72v1UsTqRUA8Dhnzr73hyQidl85lS/RN5eDthpOtnTaCQBTMzftBICpMdsXzK7Swkgf/s9H/O74kwGmYuDDvMsDNx/200ME8T0j+L9y/pOjj/+b4xlOFuP/MLs+3Pj/q2PPA5g84/8wu7rd5OCc/wv7RQDAiXSE7/h3fziuTggwVU+azHssn/8DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADACbMUEd+NJK0Uc4EvRZpWKhFPR8SzUUqubzbqlyLimTgbEaXFbH9l2kkDAEeU/jUp5v86v/zC0sHSheTfi/k6Ir7/szd/8s5qp3N7JTv+j/3ji3vTh9U+OO8I8woCAGOWt9+1Yt33h/z9e3fW9pZJ5nP3avy3mIp47cG9O/nSK5mPU/m6nPclTv8zifninHJEPB8Rc2OIv/tub/1w/dO8R7SUj4H0Zj7tjx9F7KfHFf8Tg37+B+OnD8VP87K9TCM+PoZcYNa8dzUiXht0/6VxLl8Pvv/L+TvU0d292rvY3nvfg77480WkuQHxs3v+3IFrpcNivPjbrz1ysLvcK3s34vn5QfGT/fjJkPgvjFjHP33qMz96dUhZ9+cR52Nw/P5Y1U7zVrW9vXNxs7m6Ud+o36zVrqxcufTy5Zdq1XyMuro3Uv2ov71y4ZlhuWX1Pz0kfnlg/Rf2z/3CiPX/xX/e+vZnHxP/S58f/Pt/bmD8nqxN/OKI8VdP/6o8bLL+LP76kPo/6fd/YcT47/9lZ33ElwIAE9De3rmx2mjUbx9pI+t5juM6j2xkKY71gk/Y+HMc8qyk6KYeRz6l4/qpHvvG/H5f8ZCnJ49/zbeyK064Ounha3GcG/cnFWuKb0rARHxw0087EwAAAAAAAAAAAAAAYJhJ/NeladcRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAk+t/AQAA///VU8os") 20:06:48 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x42, &(0x7f0000000040)={{{@in6=@private0, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@local}, 0x0, @in6=@private2}}, 0xe8) 20:06:48 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000080), 0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000001c0)=@srh, 0x8) 20:06:48 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340), {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r5, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff]}, 0x80) 20:06:48 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000180)=0x81, 0x4) 20:06:48 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000080), 0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) 20:06:48 executing program 4: r0 = socket(0x2, 0x3, 0x2) recvfrom$inet6(r0, 0x0, 0x0, 0x2142, 0x0, 0x0) 20:06:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000001c0)={@dev, @mcast2, @local}) 20:06:48 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x22, &(0x7f0000000080), 0x8) 20:06:48 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x35, 0x0, 0x0) 20:06:48 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) [ 368.090686][ T7338] loop0: detected capacity change from 0 to 512 [ 368.120346][ T30] audit: type=1400 audit(1686427608.706:236): avc: denied { read } for pid=7343 comm="syz-executor.4" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 368.168764][ T7338] Quota error (device loop0): v2_read_header: Failed header read: expected=8 got=0 [ 368.178479][ T7338] EXT4-fs warning (device loop0): ext4_enable_quotas:6396: Failed to enable quota tracking (type=0, err=-22, ino=3). Please run e2fsck to fix. [ 368.193657][ T7338] EXT4-fs (loop0): mount failed 20:06:48 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}}}, 0x104) 20:06:48 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000c40)='#'}) 20:06:48 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x35, &(0x7f0000000040)={{{@in6=@private0, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@local}, 0x0, @in6=@private2}}, 0xe8) [ 368.291688][ T7367] loop5: detected capacity change from 0 to 2048 [ 368.378376][ T7367] device veth0_vlan left promiscuous mode [ 368.384651][ T7367] device veth0_vlan entered promiscuous mode [ 368.394301][ T7367] device veth1_macvtap left promiscuous mode [ 368.403262][ T7367] device veth1_macvtap entered promiscuous mode [ 368.411962][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 368.419332][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.426671][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.434788][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.441655][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.448838][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 368.457027][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.464973][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 368.473101][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 368.480916][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 368.488844][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 368.496721][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 368.504577][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 368.512453][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 368.520396][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 368.528333][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 368.536191][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 368.544290][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 368.552339][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 368.560387][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 368.568430][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 368.576103][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 368.583970][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 368.591802][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 368.599683][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 368.607738][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 368.615773][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 368.623566][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 368.631284][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 368.638786][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 368.645956][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 368.654001][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 368.662228][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 368.669686][ T7369] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 368.684517][ T7369] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:49 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0), 0x84080, 0x0) 20:06:49 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:49 executing program 1: io_setup(0x4000, &(0x7f0000000000)) 20:06:49 executing program 2: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x4a, 0x0, 0x0) 20:06:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340), {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r5, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff]}, 0x80) 20:06:49 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 20:06:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x87, 0x0, 0x0, 0x0, 0xfe00}) writev(0xffffffffffffffff, 0x0, 0x0) sched_getparam(0x0, 0x0) 20:06:49 executing program 0: r0 = socket(0x2, 0x3, 0x6) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000080)={0x7}, 0x10) 20:06:49 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:49 executing program 4: syz_open_procfs(0x0, &(0x7f0000000200)='fdinfo/4\x00') 20:06:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000480)={@multicast1, @private=0xa010101}, 0xc) syz_genetlink_get_family_id$nbd(&(0x7f0000000e40), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 20:06:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_INTERFACE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r1, 0x307, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 20:06:49 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:49 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x1) [ 369.066629][ T30] audit: type=1400 audit(1686427609.656:237): avc: denied { setattr } for pid=7394 comm="syz-executor.4" name="uhid" dev="devtmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 20:06:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002240)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, 0x80) 20:06:49 executing program 0: unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') [ 369.233544][ T7405] loop5: detected capacity change from 0 to 2048 [ 369.292481][ T7405] device veth0_vlan left promiscuous mode [ 369.298670][ T7405] device veth0_vlan entered promiscuous mode [ 369.316968][ T7405] device veth1_macvtap left promiscuous mode [ 369.325671][ T7405] device veth1_macvtap entered promiscuous mode [ 369.334567][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 369.341951][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 369.349482][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 369.357749][ T4740] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.364599][ T4740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.375746][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 369.384068][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 369.392728][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 369.402116][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 369.410371][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 369.418538][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 369.426433][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 369.434678][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 369.442875][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 369.451054][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 369.459119][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 369.467269][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 369.475337][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 369.483718][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 369.491935][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 369.500445][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 369.508395][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 369.516286][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.524401][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 369.532438][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 369.541132][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 369.549458][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.557457][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 369.565267][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.572854][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 369.580310][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 369.588439][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 369.596687][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 369.604179][ T7406] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 369.625356][ T7406] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:50 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f00000008c0)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000f40)='./file0\x00') 20:06:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002240)={0x8, 0x4700, &(0x7f0000000000)=@raw=[@ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000f80)={&(0x7f0000000d80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0xa, [@func={0x4}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {0x6}, {}, {0x9}, {}, {0x3, 0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x5f, 0x0, 0x0, 0x0]}}, &(0x7f0000000ec0)=""/177, 0x6a, 0xb1, 0x1}, 0x20) 20:06:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002240)={0x9, 0x3, &(0x7f0000001100)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:50 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:50 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001e40)={0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001b00)=""/174, 0xae}], 0x1}, 0x10062) 20:06:50 executing program 2: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) syz_clone(0x22001180, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000980)) 20:06:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:50 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0xf, 0x3, &(0x7f0000000200)=@framed, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:50 executing program 0: syz_clone(0x22021580, 0x0, 0x0, 0x0, 0x0, 0x0) [ 370.154070][ T7435] loop5: detected capacity change from 0 to 2048 [ 370.233853][ T7435] device veth0_vlan left promiscuous mode [ 370.240202][ T7435] device veth0_vlan entered promiscuous mode [ 370.249678][ T7435] device veth1_macvtap left promiscuous mode [ 370.258899][ T7435] device veth1_macvtap entered promiscuous mode [ 370.268055][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 370.275469][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 370.282916][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 370.290980][ T4740] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.297832][ T4740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.305079][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 370.313323][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 370.321511][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 370.329705][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 370.337695][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 370.345642][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 370.353642][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 370.361668][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 370.369614][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 370.377570][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 370.385482][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 370.393605][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 370.401641][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 370.410033][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 370.418172][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 370.426335][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 370.434155][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 370.442076][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 370.449965][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 370.457799][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 370.465901][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 370.474068][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 370.481872][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 370.489706][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 370.496986][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 370.504181][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 370.512169][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 370.520150][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 370.527654][ T7436] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 370.541085][ T7436] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:51 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x4, 0x0, 0x4, 0x0, 0x10a}, 0x48) 20:06:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x4, 0x0, 0x4}, 0x48) 20:06:51 executing program 2: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000300)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 20:06:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x40049409, &(0x7f00000007c0)) 20:06:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001080)='mounts\x00') write$cgroup_pressure(r0, 0x0, 0x0) 20:06:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) getpgrp(r1) 20:06:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r1, &(0x7f00000000c0)='statm\x00') 20:06:51 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000000480)=[{{0x0, 0x0, 0x0, 0xfffffe0b}}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="e4319cebcb3e45735610db6ab537a8f2071e8c1e3c7e99a205bf99add2bdeb0549a20305469fd1766862b8ab8944dfea37d2913d96d45d04658edfc7658b53470bee4c814f"}, {&(0x7f0000000500)="852854e9e40ab4373266671eb56325ee162391bf61500f197c304cb54aed9287cf006dc6e7572d153b0ee03e8a4a7f672b11b79011c477a9ea5319aa57ee0f82016743091730ec08b5833172e474f7ab7f563878cc619677a163baa9668ac719d5d44077659655c20b72970314982e46e478c58b98d639603eb3f1dca15b352ed28459a20371e4595c187040d47b0ea14389eb3f7655023b465db1b63cdb0ced2d1837acfee4814070cccbe08cbf5f2a"}, {&(0x7f0000000180)="c0dd0ac9fffc668e200ea6154b4a4a74e5ece2b7a505109c4abf74caeaeb27b045cb2af0a28bfede2691d5a1075433e4342b98fb153d5bec64e56e38bb7c2e5042"}, {&(0x7f0000000200)="2b6a6acbf278d2bd048b13b4b61fbcc9a871153f7c2c78905f4894b7da61ff7538f6ab52dda11cd76398fea60149fb1abe5ae2db7105a30d9aca3241"}, {&(0x7f00000005c0)="91124934389bbec9b9976a6b42e68a3016a3a51d2a8f1fd3b94d1fb470c4f5bddf28017278120177458725f097de24b7c3f526a270ae3084b1e2f3a98d3ef573a2695158a931f941836e6f1d9957a61434cb7bd3d4b99fd223fa2618046a32a6b14e52a03e25fd07c527cf7e1c4db8f73bd0842d09a15eaa404cf398c4c6202002fc32cd936cc920722fa96e175717370f9bce52b682c716f1b9f214c07dea7bcd12596741c2d601640a6367714e99e5d9f4fbbd0b72ac5c098e4f9fd7a401ec80636ab606"}], 0x0, &(0x7f0000000400)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}]}}], 0x1, 0x0) 20:06:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') write$FUSE_WRITE(r0, 0x0, 0xfffffffffffffdac) 20:06:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') write$cgroup_devices(r0, 0x0, 0x32) 20:06:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') read$char_usb(r0, &(0x7f0000000040), 0x0) 20:06:51 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) write$cgroup_pressure(r0, 0x0, 0xd7fb9603) [ 371.057396][ T7472] loop5: detected capacity change from 0 to 2048 [ 371.097328][ T7472] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.104209][ T7472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.134996][ T7472] device veth0_vlan left promiscuous mode [ 371.141771][ T7472] device veth0_vlan entered promiscuous mode [ 371.152611][ T7472] device veth1_macvtap left promiscuous mode [ 371.162638][ T7472] device veth1_macvtap entered promiscuous mode [ 371.173657][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 371.181350][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 371.188938][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 371.197558][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 371.205769][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 371.214280][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 371.223038][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 371.231447][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 371.239806][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 371.248179][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 371.256475][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 371.264698][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 371.273012][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 371.281412][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 371.289805][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 371.299038][ T7473] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 371.313504][ T7473] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') write$FUSE_WRITE(r0, 0x0, 0xc) 20:06:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000022c0)={0xffffffffffffffff}) write$FUSE_IOCTL(r0, 0x0, 0x0) 20:06:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') read$FUSE(r0, &(0x7f0000002100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(r1, 0x0, 0x0) 20:06:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60}, 0x72dfb062ca0dd789) 20:06:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') write$cgroup_devices(r0, 0x0, 0xfffffffffffffdde) 20:06:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') write$FUSE_ENTRY(r0, 0x0, 0x0) 20:06:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') write$cgroup_devices(r0, 0x0, 0x0) 20:06:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r1, &(0x7f000000f180)='ns/user\x00') 20:06:52 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 20:06:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:52 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, 0x0) 20:06:52 executing program 4: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='.\x00', 0x4000000) 20:06:52 executing program 2: mount$9p_fd(0x0, 0x0, 0x0, 0x360000, 0x0) [ 371.975790][ T7509] loop5: detected capacity change from 0 to 2048 [ 372.020149][ T7509] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.027049][ T7509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.067059][ T7509] device veth0_vlan left promiscuous mode [ 372.074635][ T7509] device veth0_vlan entered promiscuous mode [ 372.085498][ T7509] device veth1_macvtap left promiscuous mode [ 372.094580][ T7509] device veth1_macvtap entered promiscuous mode [ 372.104251][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 372.111699][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 372.119059][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 372.127256][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 372.135928][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 372.144596][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 372.152694][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 372.160960][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 372.168925][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 372.177139][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 372.185241][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 372.193275][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 372.201331][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 372.209511][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 372.217580][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 372.225790][ T7510] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 372.240262][ T7510] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:53 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) 20:06:53 executing program 4: timer_create(0x7, &(0x7f00000001c0)={0x0, 0x5, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) 20:06:53 executing program 2: r0 = inotify_init() fstat(r0, &(0x7f0000002240)) 20:06:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0), 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:53 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) fstat(r0, 0x0) 20:06:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:53 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getsockname$unix(r0, 0x0, 0x0) 20:06:53 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) write$tcp_mem(r0, 0x0, 0x0) 20:06:53 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BINDER_GET_EXTENDED_ERROR(r0, 0xc00c6211, 0x0) 20:06:53 executing program 4: timer_create(0x2, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000000040)) 20:06:53 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x9c, 0x17, 0x5a, 0x20, 0x4a5, 0x4068, 0x5d90, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0xf, 0x0, 0xcb, 0xf1, 0xdd}}]}}]}}, 0x0) 20:06:53 executing program 2: r0 = syz_usb_connect$cdc_ncm(0x0, 0x72, &(0x7f0000001840)=ANY=[@ANYBLOB="1201000002000040257d15a4400001040001090260004201000000090400000102090000052406000105240000000d240f01000004000000001f0006031a00000004800200090581", @ANYBLOB="53d3"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_disconnect(r0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) write$char_usb(0xffffffffffffffff, &(0x7f0000000240)='^', 0x1) 20:06:53 executing program 0: syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000459bb2405804035000000000000109021b0001110000000904000001b5699b0009058be7"], 0x0) 20:06:53 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5416, 0x0) 20:06:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) [ 372.867607][ T7546] loop5: detected capacity change from 0 to 2048 [ 372.968818][ T7546] device veth0_vlan left promiscuous mode [ 372.974569][ T7546] device veth0_vlan entered promiscuous mode [ 372.981963][ T7546] device veth1_macvtap left promiscuous mode [ 372.988523][ T7546] device veth1_macvtap entered promiscuous mode [ 372.995703][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 373.003085][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 373.010383][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 373.018371][ T459] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.025217][ T459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.032542][ T637] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 373.040277][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 373.048532][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.056558][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 373.064810][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 373.072739][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 373.080863][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 373.088759][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 373.096718][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 373.104544][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 373.112524][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 373.120325][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 373.128357][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 373.136321][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 373.144454][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 373.152654][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 373.160930][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 373.168786][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 373.176729][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 373.184608][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 373.192595][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 373.200698][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 373.208954][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.216759][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 373.224633][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.232483][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 373.239704][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 373.247681][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 373.257400][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 373.265178][ T7547] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 373.278585][ T7547] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.416650][ T637] usb 1-1: config 17 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 373.427459][ T637] usb 1-1: config 17 interface 0 altsetting 0 endpoint 0x8B has invalid wMaxPacketSize 0 [ 373.437227][ T637] usb 1-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 373.446065][ T637] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 20:06:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:54 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x105001, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 20:06:54 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:06:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0), 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:54 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000440)={@local, @broadcast, @val, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @broadcast, "", @remote, "230293615c2421967458180a4e56523d"}}}}, 0x0) 20:06:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 20:06:54 executing program 4: symlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 20:06:54 executing program 2: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) chown(&(0x7f00000006c0)='./file1/file0/file0\x00', 0x0, 0x0) 20:06:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) [ 373.716611][ T637] aiptek 1-1:17.0: Aiptek using 400 ms programming speed [ 373.724312][ T637] input: Aiptek as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:17.0/input/input6 [ 373.733456][ T637] input: failed to attach handler kbd to device input6, error: -5 [ 373.747333][ T637] usb 1-1: USB disconnect, device number 4 [ 373.767737][ T7568] loop5: detected capacity change from 0 to 2048 [ 373.824558][ T7568] device veth0_vlan left promiscuous mode [ 373.831389][ T7568] device veth0_vlan entered promiscuous mode [ 373.839533][ T7568] device veth1_macvtap left promiscuous mode [ 373.848519][ T7568] device veth1_macvtap entered promiscuous mode [ 373.857915][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 373.865201][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 373.872843][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 373.881093][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.887960][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.899649][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 373.908217][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.916443][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 373.924829][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 373.932930][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 373.941228][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 373.949356][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 373.957693][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 373.965648][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 373.974238][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 373.982651][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 373.990799][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 373.999109][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 374.007880][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 374.016450][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 374.024836][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 374.032937][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 374.041004][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 374.049046][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 374.057113][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 374.065605][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 374.074457][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 374.082490][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 374.090451][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 374.097987][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 374.105329][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 374.113500][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 374.122604][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 374.131848][ T7569] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 374.145738][ T7569] bridge0: port 1(bridge_slave_0) entered disabled state 20:06:54 executing program 0: syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000459bb2405804035000000000000109021b0001110000000904000001b5699b0009058be7"], 0x0) 20:06:54 executing program 2: syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000700)={0x0, 0x0, 0x20, &(0x7f0000000540)={0x5, 0xf, 0x20, 0x2, [@ext_cap={0x7, 0x10, 0x2, 0x1a}, @generic={0x14, 0x10, 0x4, "eb85c7f21dd7cc3f78e95533a9f6ecc561"}]}}) 20:06:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:54 executing program 4: syz_usb_connect(0x0, 0x34, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xbe, 0x9a, 0x81, 0x20, 0x19d2, 0xff64, 0x717e, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xff, 0xff, 0xff, 0x0, [], [{{0x9, 0x5, 0xc, 0x0, 0x0, 0x6, 0x4, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x8, 0x8}]}}]}}]}}]}}, 0x0) 20:06:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) rename(&(0x7f0000000080)='./file1\x00', &(0x7f0000000840)='./file0\x00') 20:06:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:55 executing program 1: syz_emit_ethernet(0x5e, &(0x7f00000000c0)=ANY=[@ANYBLOB="c33778b114ecffffffffffff86dd6007cb1000282f00fe8000000000000000000000000000bbfe8000000000000000000000000000aa"], 0x0) 20:06:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0), 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:06:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:55 executing program 1: wait4(0x0, 0x0, 0x47ab82567a973489, &(0x7f0000000040)) 20:06:55 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) rename(&(0x7f0000000080)='./file0\x00', 0x0) [ 374.486557][ T459] usb 5-1: new high-speed USB device number 17 using dummy_hcd [ 374.496664][ T20] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 374.632127][ T7596] loop5: detected capacity change from 0 to 2048 [ 374.693124][ T7596] device veth0_vlan left promiscuous mode [ 374.699672][ T7596] device veth0_vlan entered promiscuous mode [ 374.709530][ T7596] device veth1_macvtap left promiscuous mode [ 374.718471][ T7596] device veth1_macvtap entered promiscuous mode [ 374.726542][ T459] usb 5-1: Using ep0 maxpacket: 32 [ 374.743482][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 374.751106][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 374.758635][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 374.766997][ T4698] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.773856][ T4698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 374.781397][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 374.789956][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 374.798151][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 374.806878][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 374.814859][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 374.823115][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 374.831202][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 374.839296][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 374.847309][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 374.855355][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 374.863488][ T459] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 374.873206][ T20] usb 1-1: config 17 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 374.884259][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 374.892076][ T20] usb 1-1: config 17 interface 0 altsetting 0 endpoint 0x8B has invalid wMaxPacketSize 0 [ 374.902234][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 374.910114][ T20] usb 1-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 374.919362][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 374.927372][ T20] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 374.935420][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 374.943783][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 374.952268][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 374.960116][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 374.968093][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 374.975874][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 374.983900][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 374.992721][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 375.001195][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 375.009053][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 375.016880][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 375.024185][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 375.031520][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 375.039459][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 375.047261][ T459] usb 5-1: New USB device found, idVendor=19d2, idProduct=ff64, bcdDevice=71.7e [ 375.056324][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 375.063564][ T459] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 375.071599][ T459] usb 5-1: Product: syz [ 375.071614][ T7597] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 375.075573][ T459] usb 5-1: Manufacturer: syz [ 375.075590][ T459] usb 5-1: SerialNumber: syz [ 375.087119][ T459] usb 5-1: config 0 descriptor?? [ 375.103934][ T7597] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.206652][ T20] aiptek 1-1:17.0: Aiptek using 400 ms programming speed [ 375.214084][ T20] input: Aiptek as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:17.0/input/input7 [ 375.223208][ T20] input: failed to attach handler kbd to device input7, error: -5 [ 375.232119][ T20] usb 1-1: USB disconnect, device number 5 [ 375.337658][ T459] usb 5-1: USB disconnect, device number 17 20:06:56 executing program 1: chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) chown(&(0x7f00000006c0)='./file1/file0/file0\x00', 0x0, 0x0) 20:06:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:56 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000440)={@local, @broadcast, @val, {@arp={0x806, @generic={0x20, 0x0, 0x6, 0x0, 0x0, @broadcast, "", @remote, "230293615c2421967458180a4e56523d"}}}}, 0x0) 20:06:56 executing program 4: syz_usb_connect(0x0, 0x34, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xbe, 0x9a, 0x81, 0x20, 0x19d2, 0xff64, 0x717e, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xff, 0xff, 0xff, 0x0, [], [{{0x9, 0x5, 0xc, 0x0, 0x0, 0x6, 0x4, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x8, 0x8}]}}]}}]}}]}}, 0x0) 20:06:56 executing program 0: syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000459bb2405804035000000000000109021b0001110000000904000001b5699b0009058be7"], 0x0) 20:06:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340), {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r5, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff]}, 0x80) 20:06:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @loopback, @broadcast}}}}) 20:06:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x4, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@alu={0x4}]}, &(0x7f00000003c0)='GPL\x00', 0x5, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080), 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x6) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) r3 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000800)={'ip6_vti0\x00', &(0x7f0000000380)={'syztnl0\x00', r4, 0x0, 0x40, 0x32, 0x401, 0x72, @mcast1, @remote, 0x8000, 0x8000, 0xe870, 0x2}}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000180)={0x2, {0x2, 0xffff, 0xffff, 0x7, 0x9, 0x4}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000500)=@gettfilter={0x44, 0x2e, 0x2, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r4, {0x5, 0x4}, {0xe, 0xffff}, {0x8, 0x3}}, [{0x8, 0xb, 0xed4a}, {0x8, 0xb, 0x5}, {0x8, 0xb, 0x401}, {0x8, 0xb, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x8080}, 0x8001) recvmmsg(r2, &(0x7f0000000740)=[{{&(0x7f00000005c0)=@tipc, 0x80, &(0x7f0000000400)=[{&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000000640)=""/251, 0xfb}], 0x2}}], 0x40002db, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e55d7d2acbd85a92920060000000f04000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_mount_image$exfat(&(0x7f0000001500), &(0x7f0000000040)='./file0\x00', 0x20010080, &(0x7f0000000300)=ANY=[], 0x9, 0x14d7, &(0x7f0000002a80)="$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") r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) accept4$unix(r5, 0x0, &(0x7f00000002c0), 0x80000) connect$unix(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x200, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {}, 0x2c, {[{@mmap}, {@mmap}, {@aname={'aname', 0x3d, 'wfdno'}}]}}) 20:06:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @loopback, @broadcast}}}}) 20:06:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080), 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x17, 0x0, 0x0) 20:06:56 executing program 2: io_setup(0x6, &(0x7f0000000000)=0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x18}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 375.969896][ T7632] loop5: detected capacity change from 0 to 2048 [ 376.050122][ T7632] device veth0_vlan left promiscuous mode [ 376.056424][ T7632] device veth0_vlan entered promiscuous mode [ 376.066309][ T7632] device veth1_macvtap left promiscuous mode [ 376.075551][ T7632] device veth1_macvtap entered promiscuous mode [ 376.083853][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 376.091469][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 376.103000][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 376.111309][ T637] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.116534][ T4740] usb 5-1: new high-speed USB device number 18 using dummy_hcd [ 376.118182][ T637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.132874][ T20] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 376.140455][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 376.148797][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 376.157078][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 376.165297][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 376.173351][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 376.181732][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 376.189791][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 376.198638][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 376.208834][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 376.216891][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 376.224995][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 376.233092][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 376.241163][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 376.249440][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 376.257573][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 376.265668][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 376.273503][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 376.281340][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 376.289239][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 376.297088][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 376.305167][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 376.313368][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.321158][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 376.329155][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.336456][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 376.343847][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 376.351893][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 376.356544][ T4740] usb 5-1: Using ep0 maxpacket: 32 [ 376.360143][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 376.372104][ T7633] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 376.386724][ T7633] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.476602][ T4740] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 376.536635][ T20] usb 1-1: config 17 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 376.547463][ T20] usb 1-1: config 17 interface 0 altsetting 0 endpoint 0x8B has invalid wMaxPacketSize 0 [ 376.557270][ T20] usb 1-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 376.566214][ T20] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 376.636618][ T4740] usb 5-1: New USB device found, idVendor=19d2, idProduct=ff64, bcdDevice=71.7e [ 376.645541][ T4740] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 376.653408][ T4740] usb 5-1: Product: syz [ 376.657359][ T4740] usb 5-1: Manufacturer: syz [ 376.661761][ T4740] usb 5-1: SerialNumber: syz [ 376.667451][ T4740] usb 5-1: config 0 descriptor?? [ 376.836610][ T20] aiptek 1-1:17.0: Aiptek using 400 ms programming speed [ 376.848121][ T20] input: Aiptek as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:17.0/input/input8 [ 376.857357][ T20] input: failed to attach handler kbd to device input8, error: -5 [ 376.866162][ T20] usb 1-1: USB disconnect, device number 6 [ 376.912609][ T637] usb 5-1: USB disconnect, device number 18 20:06:58 executing program 4: connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)={0x0}}, 0x0) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r1, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 20:06:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008000, &(0x7f00000003c0)=ANY=[@ANYBLOB='debug,orlov,nodiscard,test_dummy_encryption,nojournal_checksum,init_itable=0x000000p000000000,usrquota,usrquota,\x00'], 0x0, 0x5c1, &(0x7f0000000600)="$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") 20:06:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080), 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340), {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r5, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff]}, 0x80) 20:06:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000080)) 20:06:58 executing program 0: syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000459bb2405804035000000000000109021b0001110000000904000001b5699b0009058be7"], 0x0) 20:06:58 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x18, 0x7, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x28}, @kfunc, @map_fd={0x18, 0xa}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000740)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0xe, 0x0, 0x8f1a}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="dd", @ANYRES16, @ANYBLOB="007216170000000000000000990606ad4aa1", @ANYRES32, @ANYRES32], 0x448}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000003540)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_GROUP_FWD_MASK={0x6, 0x9, 0x2}]}}}]}, 0x3c}, 0x1, 0xba01}, 0x0) recvmmsg(r1, &(0x7f0000004800)=[{{&(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '[@)'}, {0x20, 'rcu_utilization\x00'}, {0x20, 'GPL\x00'}, {0x20, '*})\''}, {0x20, '@'}, {0x20, 'rcu_utilization\x00'}, {0x20, 'bridge\x00'}, {}], 0xa, "ddc3cfcd5269c9a8c254af4e787eb656cc129e5146b3d7a4dfc5787319b953353c05571445bbf8cfc58df3ef8715d6144fa07307c52cd337c204c84943a8f3a59e29fdd710fee47204c8fcae0f0243ac8e163a839f1582e5a534687b310bdaad168f943e1e05accf62cebaabb496a993f71d9f221631cca35bd865630e7e1d662d659c43e376994d85462073f75f82e8e42659b075f019cc516e"}, 0xe0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000340)=0x4) 20:06:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x5, 0x3, &(0x7f0000000380)=@framed, &(0x7f00000003c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb04) 20:06:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r2, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 20:06:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) [ 377.452664][ T7647] loop4: detected capacity change from 0 to 2048 [ 377.554071][ T7663] loop5: detected capacity change from 0 to 2048 [ 377.567286][ T7658] device veth1_macvtap left promiscuous mode [ 377.573704][ T7658] device veth1_macvtap entered promiscuous mode [ 377.588884][ T7658] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 377.605754][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 377.617342][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 377.625664][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 377.633799][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 377.642050][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 377.650237][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 377.658502][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 377.666657][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 377.674855][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 377.682430][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 377.690585][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 377.699096][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.706281][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.706533][ T2405] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 377.713661][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 377.729196][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 377.737596][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 377.746297][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 377.754449][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 377.762652][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 377.771430][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 377.780005][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 377.788415][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 377.797150][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 377.805534][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 377.815414][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 377.823501][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 377.831941][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 377.839970][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 377.848183][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 377.855997][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 377.863930][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 377.871721][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 377.879664][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 377.887911][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 377.895991][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 377.903855][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 377.911707][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 377.919820][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 377.928072][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 377.935696][ T7662] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 20:06:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x10, 0x0, 0x0) 20:06:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) [ 377.951724][ T7662] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.958704][ T7662] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.983539][ T7664] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 378.010391][ T7664] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.074867][ T7663] device veth0_vlan left promiscuous mode [ 378.080680][ T7663] device veth0_vlan entered promiscuous mode [ 378.086836][ T2405] usb 1-1: config 17 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 378.088185][ T7663] device veth1_macvtap left promiscuous mode [ 378.098112][ T2405] usb 1-1: config 17 interface 0 altsetting 0 endpoint 0x8B has invalid wMaxPacketSize 0 [ 378.105447][ T7663] device veth1_macvtap entered promiscuous mode [ 378.113277][ T2405] usb 1-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 378.120223][ T7666] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 378.128034][ T2405] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 20:06:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:58 executing program 4: r0 = socket(0x18, 0x0, 0x2) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) [ 378.416594][ T2405] aiptek 1-1:17.0: Aiptek using 400 ms programming speed [ 378.423823][ T2405] input: Aiptek as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:17.0/input/input9 [ 378.432859][ T2405] input: failed to attach handler kbd to device input9, error: -5 [ 378.442548][ T2405] usb 1-1: USB disconnect, device number 7 20:06:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x22, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x0, 0xffffffff, 0xffffffff, 0x120, 0xffffffff, 0x220, 0xffffffff, 0xffffffff, 0x220, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@ip={@rand_addr, @multicast2, 0x0, 0x0, 'bridge_slave_1\x00', 'sit0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x280) 20:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x4, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4, 0x0, 0xc}]}, &(0x7f00000003c0)='GPL\x00', 0x5, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340), {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r5, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff]}, 0x80) 20:06:59 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r2, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 20:06:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:59 executing program 4: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4f2, 0x1421, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f00000001c0)=@lang_id={0x4}}, {0x6a, &(0x7f00000003c0)=@string={0x6a, 0x3, "1d1dc74b7fdf8a454d97d1577531484193dcf647d0c2249961312ce23a7cc2190012c26ae1c9b6369f225e20f7cb0363a41d1df472134fc79daa8b7915e1d09c0084c787062343b16fc35965c4c336e0ff7918a8fe2c403bb298f56b81b4422b80c3e9b1a1345bd8"}}]}) 20:06:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {0xa, 0x0, 0x80, 0x1}, [@FIB_RULE_POLICY=@FRA_OIFNAME={0x14, 0x11, 'team_slave_0\x00'}]}, 0x30}}, 0x0) 20:06:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:59 executing program 0: ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) syz_usb_connect$hid(0x2, 0x3f, &(0x7f0000000080)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x10, 0x4f2, 0x1421, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0xaf8}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x7, 0x0, 0x80}}, [{{0x9, 0x5, 0x2, 0x3, 0x3ff, 0x0, 0x0, 0x4}}]}}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x201, 0x8, 0x0, 0xb0, 0x8}, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000007c0)) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000800)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x5ac, 0x25b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x1, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x3f, 0x2, 0x3, 0x1, 0x0, 0xff, {0x9, 0x21, 0x0, 0x8}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x0, 0x5}}}}}]}}]}}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000dc0)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000e00)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000e40), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000e80), 0x7, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000ec0)) r2 = syz_open_dev$loop(&(0x7f0000001000), 0x5, 0x0) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000001040)={0x81, 0x3, 0x0, [{0x21, 0xffffffffffffff7a, 0x8000000000000001, 0x8a}, {0x0, 0x4, 0xd6f, 0x0, 0x3, 0xa6, 0x9, '\x00', 0xffffffffffff0001}, {0x0, 0x100000000, 0x0, 0x4, 0x0, 0x0, 0x0, '\x00', 0x3}]}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000001280)={'wpan0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000001300), 0xffffffffffffffff) 20:06:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000001540)={&(0x7f0000001440), 0xc, &(0x7f0000001500)={0x0}}, 0x80801) 20:06:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x4, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbf410000}, [@alu={0x5, 0x0, 0x2}]}, &(0x7f00000003c0)='GPL\x00', 0x5, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:06:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xff9f, &(0x7f0000000080)={&(0x7f0000000040)=@newtclass={0x34, 0x28, 0x0, 0x0, 0x0, {}, [@TCA_RATE, @TCA_RATE={0x6}]}, 0x34}, 0x8}, 0x0) [ 379.015184][ T7706] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7706 comm=syz-executor.1 [ 379.048547][ T7705] loop5: detected capacity change from 0 to 2048 [ 379.059151][ T7684] device veth1_macvtap left promiscuous mode [ 379.065535][ T7684] device veth1_macvtap entered promiscuous mode [ 379.090771][ T7684] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 379.107045][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 379.115555][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 379.123110][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 379.131252][ T637] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.138135][ T637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.145760][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 379.154218][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 379.165639][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 379.173960][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 379.182028][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 379.192152][ T20] usb 5-1: new high-speed USB device number 19 using dummy_hcd [ 379.201936][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 379.209980][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 379.218017][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 379.225983][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 379.226534][ T2405] usb 1-1: new full-speed USB device number 8 using dummy_hcd [ 379.234141][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 379.249185][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 379.257307][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 379.265538][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 379.273725][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 379.282292][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 379.290640][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 379.298549][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 379.306646][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 379.314525][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 379.323759][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 379.332082][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 379.346739][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.366743][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 379.374366][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 379.382417][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 379.390407][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 379.397979][ T7709] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 379.415507][ T7709] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.446912][ T20] usb 5-1: Using ep0 maxpacket: 16 [ 379.464563][ T7684] syz-executor.2 (7684) used greatest stack depth: 19416 bytes left [ 379.483947][ T7705] device veth0_vlan left promiscuous mode [ 379.489724][ T7705] device veth0_vlan entered promiscuous mode [ 379.496439][ T7705] device veth1_macvtap left promiscuous mode [ 379.503432][ T7705] device veth1_macvtap entered promiscuous mode [ 379.510172][ T7711] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 379.576605][ T20] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 20:07:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340), {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={0x0}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r5, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff]}, 0x80) 20:07:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:00 executing program 1: syz_emit_ethernet(0x1cf, &(0x7f00000006c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa81002e0086dd"], 0x0) [ 379.716589][ T2405] usb 1-1: unable to get BOS descriptor or descriptor too short [ 379.746672][ T20] usb 5-1: New USB device found, idVendor=04f2, idProduct=1421, bcdDevice= 0.40 [ 379.755719][ T20] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 379.764319][ T20] usb 5-1: Product: syz [ 379.772812][ T20] usb 5-1: Manufacturer: á´ä¯‡ä–Šé埑ㅵ䅈䟶ì‹é¤¤ã…¡îˆ¬ç°ºá§‚ሀ櫂짡㚶⊟âžì¯·æŒƒá¶¤ïá²ìêªç¦‹î„•é³è€èŸ‡âŒ†ë…ƒì¯æ•™ì„秿ꠘ⳾㭀颲毵ë’⭂쎀뇩㒡 [ 379.778808][ T2405] usb 1-1: not running at top speed; connect to a high speed hub [ 379.790094][ T20] usb 5-1: SerialNumber: syz [ 379.836989][ T20] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 379.876664][ T2405] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 10 [ 379.887741][ T2405] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x2 has invalid maxpacket 1023, setting to 64 [ 379.953725][ T7721] loop5: detected capacity change from 0 to 2048 [ 380.013299][ T7721] device veth0_vlan left promiscuous mode [ 380.019664][ T7721] device veth0_vlan entered promiscuous mode [ 380.029558][ T7721] device veth1_macvtap left promiscuous mode [ 380.039677][ T480] usb 5-1: USB disconnect, device number 19 [ 380.043814][ T7721] device veth1_macvtap entered promiscuous mode [ 380.077966][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 380.085371][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 380.092801][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 380.101249][ T505] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.108116][ T505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 380.115280][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 380.123656][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 380.132162][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 380.140199][ T2405] usb 1-1: string descriptor 0 read error: -22 [ 380.146180][ T2405] usb 1-1: New USB device found, idVendor=04f2, idProduct=1421, bcdDevice= 0.40 [ 380.155775][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 380.163723][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 380.171546][ T2405] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 380.179692][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 380.188525][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 380.196456][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 380.204588][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 380.212522][ T7698] raw-gadget.1 gadget: fail, usb_ep_enable returned -22 [ 380.219693][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 380.228436][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 380.236342][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 380.244492][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 380.252838][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 380.260993][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 380.269177][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 380.277001][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 380.284795][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 380.292755][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 380.300641][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 380.308895][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 380.317050][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.324749][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 380.332533][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 380.339838][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 380.347132][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 380.355026][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 380.363049][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 380.370482][ T7722] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 380.383458][ T7722] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0xb, 0x0, 0x9}]}, &(0x7f00000003c0)='GPL\x00', 0x4, 0xa4, &(0x7f0000000080)=""/164, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:07:01 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r2, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 20:07:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x20000000000005) [ 380.536695][ T2405] usbhid 1-1:1.0: can't add hid device: -71 [ 380.542554][ T2405] usbhid: probe of 1-1:1.0 failed with error -71 [ 380.550043][ T2405] usb 1-1: USB disconnect, device number 8 [ 380.602234][ T7727] device veth1_macvtap left promiscuous mode [ 380.608594][ T7727] device veth1_macvtap entered promiscuous mode [ 380.615731][ T7727] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 380.631963][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 380.639407][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 380.646894][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 380.655226][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.662080][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 380.669515][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 380.677790][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 380.686135][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 380.694489][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 380.702596][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 380.711801][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 380.722223][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 380.730336][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 380.738579][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 380.746760][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 380.754680][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 380.762865][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 380.771073][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 380.779217][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 380.787247][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 380.795329][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 380.803142][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 380.810956][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 380.818893][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 380.826745][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 380.835866][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 380.844077][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.851795][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 380.859675][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 380.867858][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 380.875856][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 380.883567][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 380.891061][ T7727] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 20:07:01 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x40045564, 0x0) 20:07:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x4, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x5, 0x0, 0x4}]}, &(0x7f00000003c0)='GPL\x00', 0x5, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:07:01 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) 20:07:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340), {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={0x0}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r5, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff]}, 0x80) 20:07:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x4, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x5, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000003c0)='GPL\x00', 0x5, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:07:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff4}]}, &(0x7f00000003c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:07:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) [ 380.905278][ T7727] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:01 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r2, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 20:07:01 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x4, 0x3, &(0x7f0000000380)=@framed, &(0x7f00000003c0)='GPL\x00', 0x5, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 20:07:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x25, 0x0, 0x0) 20:07:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) 20:07:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0x8001) recvmmsg(r1, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) syz_mount_image$exfat(&(0x7f0000001500), &(0x7f0000000040)='./file0\x00', 0x20010080, &(0x7f0000000300)=ANY=[], 0x9, 0x14d7, &(0x7f0000002a80)="$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") connect$unix(0xffffffffffffffff, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) 20:07:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 20:07:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) [ 381.076049][ T7765] loop5: detected capacity change from 0 to 2048 [ 381.083406][ T7766] loop4: detected capacity change from 0 to 256 [ 381.093448][ T7766] exFAT-fs (loop4): failed to load upcase table (idx : 0x00010000, chksum : 0x4f9d53fa, utbl_chksum : 0xe619d30d) [ 381.106829][ T7747] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.113722][ T7747] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.140374][ T7747] device veth1_macvtap left promiscuous mode [ 381.148560][ T7747] device veth1_macvtap entered promiscuous mode [ 381.156328][ T7747] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 381.172924][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 381.182800][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 381.195695][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 381.211777][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 381.224092][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 381.232741][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 381.242061][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 381.250348][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 381.258601][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 381.267044][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 381.275346][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 381.283875][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 381.292055][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 381.300512][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 381.308526][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 381.371142][ T7765] device veth0_vlan left promiscuous mode [ 381.377641][ T7765] device veth0_vlan entered promiscuous mode [ 381.387923][ T7765] device veth1_macvtap left promiscuous mode [ 381.397157][ T7765] device veth1_macvtap entered promiscuous mode [ 381.404152][ T7767] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 381.420440][ T7767] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.442154][ T7768] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 20:07:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x4, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x32}]}, &(0x7f00000003c0)='GPL\x00', 0x5, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:07:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:02 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) 20:07:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340), {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={0x0}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r4, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r5, r5, 0xffffffffffffffff, r5, 0xffffffffffffffff]}, 0x80) 20:07:02 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r2, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) 20:07:02 executing program 1: request_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0) 20:07:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:02 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) 20:07:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0x8001) recvmmsg(r1, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) syz_mount_image$exfat(&(0x7f0000001500), &(0x7f0000000040)='./file0\x00', 0x20010080, &(0x7f0000000300)=ANY=[], 0x9, 0x14d7, &(0x7f0000002a80)="$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") connect$unix(0xffffffffffffffff, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) 20:07:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:02 executing program 1: inotify_init1(0x4eab440bd8dbdd82) 20:07:02 executing program 0: pread64(0xffffffffffffffff, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) 20:07:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:02 executing program 0: pread64(0xffffffffffffffff, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) 20:07:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TCSETS(r0, 0x5434, 0x0) [ 381.900464][ T7777] device veth1_macvtap left promiscuous mode [ 381.914844][ T7777] device veth1_macvtap entered promiscuous mode [ 381.922392][ T7777] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 381.939592][ T7805] loop4: detected capacity change from 0 to 256 [ 381.950678][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 381.959880][ T7805] exFAT-fs (loop4): failed to load upcase table (idx : 0x00010000, chksum : 0x4f9d53fa, utbl_chksum : 0xe619d30d) [ 381.977242][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 381.984580][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 381.992842][ T459] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.999738][ T459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.009614][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 382.018103][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 382.026316][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 382.034864][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 382.043102][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 382.051299][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 382.054655][ T7806] loop5: detected capacity change from 0 to 2048 [ 382.059445][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 382.081922][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 382.090173][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 382.098391][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 382.106314][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 382.114645][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 382.124415][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 382.133208][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 382.141576][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 382.150003][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 382.157995][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 382.166084][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 382.174122][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 382.182306][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 382.190938][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 382.199711][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.207734][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 382.215580][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 382.223821][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 382.232014][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 382.239681][ T7795] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 382.268935][ T7795] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.368627][ T7806] device veth0_vlan left promiscuous mode [ 382.375225][ T7806] device veth0_vlan entered promiscuous mode [ 382.382010][ T7806] device veth1_macvtap left promiscuous mode [ 382.388520][ T7806] device veth1_macvtap entered promiscuous mode [ 382.395279][ T7807] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 20:07:03 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SET_MACPARAMS(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0) 20:07:03 executing program 0: pread64(0xffffffffffffffff, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) 20:07:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:03 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r2, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) 20:07:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:07:03 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) accept4$inet(r0, 0x0, 0x0, 0x80400) 20:07:03 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) 20:07:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x5423, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "d83a05fe140676e94163665b59f01f3ba1f5a9"}) 20:07:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:03 executing program 1: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x80000000, 0x0, 0x0, 0x7, "d83a05fe140676e94163665b59f01f3ba1f5a9"}) 20:07:03 executing program 4: sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) clock_getres(0x0, &(0x7f0000000140)) 20:07:03 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x1dd00) syz_fuse_handle_req(r1, &(0x7f00000020c0)="411316e2df681c97f3e64cd82ef9c30a2e98924b4dedc782b49a476022fedb1fd43fc7169b184660c850a1395bc5475683af50d192f46e8ad9db0779b17191822a76f300a4250503610eba10acc34b5e30bf1ee04030c05b3540a30db3ea00d96102256c51504ab60e39ee309a12160a6336ea81c520ca18ee1cf939487cbd38492313084f54b641aa8b76d27acf86de450f361d623b375aef056e4d9e6f2982706588c5f9c1c12746d9ae95d1aaf611dae7f12dc0ceb98283628fe89a15894f84012c7d85051310d43646ad6e114f25194ec2799c81edd64d9b5df4897cae3b2719ae1ab6052ea123eac26f8f073827683efd8aeddf49681f3757f039ef740f5588954e7493ffede4fd8532ac7a9ec58a499d24ba442e84aebfddda8d93f27a9f41b4aa70a504b784bbea9d051ce4da5dd868b510f662b2980c3b5907065261da6da25ceb39c4f1fee16ee1ad49c75c74e88a551d6907a85e99d618ddc57ec68b3876d718b72c57d7612a1f2a4c2b5d653c94c3f38b16afc2a6c71f4fb0db9cf07a3b2776ed674eb5b8cc3b57ebd0aa1a111ee1eb5e045bbf7979798df0d017944ea00c5efe26a92bda457ec0853913f22f093e71079f490e5d0cec16c8428b1dcbe0bdfb5acea1ce43a1a6b0754ede0cea6b70d75a24fdf184f1a91d5451fe2d66c3617a2bf1077101e8f2f970456fc6dd8c204d5f10e34e30b8e0078b78b181909e3867ef2fe395095d96ab5411028397f4e5daf0a6447f711eac41101bf3e0f2ddc9e05c523c26814e42cab63ef590f2ea1bcad2bf68d1b19a633d0498927c946980cdcd4060703417e779a80908e4e35cac05f5998c5ecd7d7624a62f086f8acb6abd3900fb8eaa720411a1d0ad5e1e84c3c5e039e0f11fc24c1d066bff9c2c5330dc3aebde0064df23e596065f4c404bce1ce577402abd317eace96dfb200d12c306f061656a7a89263dd94f01d7b22fe03d1f5a5ce9cee8f868c15e9b16189b5b8fbcbdad82fc8ea6fe2cd2a6c2074da6ddc673bdbec77cea236eae980120f3bac58e9bce8867576c79a432970d6383269cb285e00ce04e866223f2b6d54fa286e20e8656bcfcc6898bfe9c539973bd5f072072b24524f2f8ab35a39604af157aeaed017a7bc51f8dbd91363442a26c7a4bce33a0d78475d7be79f2650f3e0ca121f974e25294212a6b752c00d17a1e576017366098c82451d6eeb75f907a31d03f04e37e89e4ff2af1c36cba520caf86aeecbeafba6c840097031c70ee12c8f469c997bd9bdbbcc76902e0c8d805e263263eed84eb3cbde72a37f8e1ccee9d3608e0d67622999edec77445e2e3ab632f2c0e98c0ff409267ecbb9fda3a4d8a4798697632bd13ee1345941ec4d8aadb8fe6a56c80544a1cdd56dac9c220fe2fc493451428768a02d4d5f418c8aa2002de19caea5b4702e0e45d4abbc6e5ae6fe225c35bb0ba525e0e0c9c36e4e5de8d148e815895b4c8e8dc52cd89b91f7930b8b9d5c241f6e6cba26dfa13b0806f20edd40febf2fe6c6f3de10f8f639b0604e7a53cd5a5a1c0766f4704e8b8439c5e5a0031dcc3130b7528b5e427ad9070b3854790facb69f55ed0a5e7f03af6855f0cc1e54962f0a890413a0cb74cac2fd68fe20129e43008ae4fb6d5f9ac62d92e93c72932696f363ef9cb01955d5d4285b031679f5db80323378f333fddc4289ba22ca26c3543a00fc385f77cb56caf1520682d0a276a7244a408bc69fdf8be114f28d14967517f600c19b194bbf12cdbb8c9d2846de4346d01745c3a16036ccd4ba90b853ee5a708afbe43ef38d6bce309cf7b3054d5d1291dbeac4b9379148ead02801f457fa34bc7d06b374dfd803a1dd14c2fda92426fe70924744cc16c200e7e2c93810873d0ee101c9215d1742ae67b70dd745a56d9e8e113a69cc71f2ca1992a1ce285ef47d89239babd07e5224068878899bfda9500265138c0214ecfbaa6b94240f05bed0905497df4ea0cff4afac360c42710354ed27041f9ef19a9215d15a10168a5df6dc9a83b09ea6f7b4f8c3c0b84fd9060aa6ff70166d87b9ae6c768c73725dd54fa254693d057f6f9daa70f20f51a43ca0087f1b1cfc11b35c40d27ddc493ef72dca8242c5710c1b37a19c08fe5430d46c90efa7a6cc0d48f01f7b65670a9a21b97396c3d0704a0a2d52b8082a8d78485d0230325d3e439eb1017673b3095673815d95e8685e1045c271678b2dc596db6915bef2f0ff8d90f20c33dcc8425ae1fc5c2d3e7954af030b4539355090b0b47a5e228e43d35d35343b065cb25773b3a36329dda8b4a37015264f5dbd735e4fe5374c91ea09c95fab1c2c01d3d61a8b6e7ceb00b573a5107899069fa3927bcfe5b0319f9fe640af9d359e5b55f31964d165d62d4dcfff4004e5e33bb42c1de142671b1617ea649c97b8168ff1f9072b9158e96a592d78c01e176c234302d83adfae216818955b702bbc0f071119daa84040c3e3e5efe98ab18c5370b0dcc413e28b1a2d18f313e547ba34b29fe1b820712caa458d7ae4684c16996130f74cdd9aacb794a0230a043cf7797b5c548e7480bc7a0b89182f95a543e228ea5a2da0c41d2425c7f43f25385f85fe0035bb979d042efaa213bd391d9f348aab1b892b09422fde9eb01173bd9bfd9d13bb114bb05e8d261bbf919dc22bee0baa0f7a059f9e37e3053a0d9e404d2833a5a7a80abcebeac161c20d6b3cbfdf29baf80d090c00c42fcccc35a6086b624ea03acf7aa0e77962fcb738ef07444375910b50a7f2f2a03fe9cfb2c9599797b15403208b7a7602c6f6864c98a32030901bff92572e067c657c6e0a646a79bb902248c1b8cb343600b6b955501fc7e21b49922d3f857754e372e77a8b9092e663873b3acae07d1edabbbffac8ee0b7afd0268f7b2c770acc0b3153482c4c2930ce39ecc9c8fff15e49a2f82a7beade988dcf0912e7cffd796f7aadb7bd687c1be6219414b6b466ff9a6c40f66d6d4587452411a28387cbbd5c6bf5cbd5898f49b95453d42ae9015f04ee8ba4ed67594281a9c037e4df090ea545f4e529f48af9114f082fb632576a031257fd01fa7d856094c7311207bdeebc0ef530f77609c976c05e9f965293f3d747bdf30eb3190b2ef50ff39d8d375cd3649ec6d2a1da0f5dd14bf041b1cc048f49d3fd7ff98f54524a25315c2c707fcc0cfe5e7a4df220476368b00d4091721d9118e72fd71196f229e08a7690cd3d5e6f768f295ae23480e6306fe956b94a2a362278f6183ce9a9fa52c8d320b9326c5105c9280f49b7cf60994891ba0daf5ee2bd542aa20e5d61fbbd9ac3aa1573e89f59fae53bdb50aa2b7a8d17f40d3bd86e1258d0829f8729b363d33d6856378eccab947111b96f8660a619b44e2b23940bb27a8d3e1fa3592d212d7ef5624b62358ece7365ff0f08c9900842ac7fc2a0283f4f3a6716189fb32914708875b4e94704ab82f95a5e89bb4d400154f76810f7e28709eabfb47b2f530e34b8507ddfd95ef9ccce8ceb47df0acaf9865f9917cc7d7ae9908294af5471a4e9242ffd582f23b801527dcaaecdcbd1001bd8869bede3b12a773f8ecfc734f87019838d3fe0ec786de5fbfb9a9e218b99ee26fc08d2fe67036d923c4435f0af9f1359b8e62663b71270935229dc030a6f344c299bd01b8ffb2c194b77c8860b29f88165763e8803fcc65c1182ed16494d060a21de7ef45af7635c90eaccfe73e48d4244695016cc61fee9d7fbdc5f12db0e5502f38e793a7429c0899515dcd390bf1a3755e754dfc6b66eeedd45f7ea2c7054aced5a5f09b952fe8cde11dc78d73f26ef3d4de0fcb7b683fc3a33c7dfc9d7870f21293e7119c8819f829a5dd1c8cc1153d406c3b71099347808ce037df83518556b6a7d4b6025100e950716eea9029404df0cb2a76e738a93e4b88328d7418e330faf2d24b37ed7dd5e76feddd9be0a9495901ddb273341b64f2e67ca4b040d5bd5fcd3fb2b87f129f1a991bf18d14bf960a698d008de7cef0d8f2531616c17e802ba24e2b1a1c4e59c4f0d5f36e0b31935992f95dcee4c60aedf79934cba6b9ef68e26b8da0d5c4e3b63788dda1b436990540d1db5da98dd761a3ce7c99ed76d7b8cc80de49ee792d14ea533329541c154f857a149bee08fea2f5e6d8e9e6f7819123c7e82d514d0ea9ae0ba9442e33c4b4755454594a3a8b7599ef36ce57bfe5d4fa6b07f563dacb09e0704481f0e16dcccbdb082d237070028b4121ff4f0a65f878050f6303c8ea62afc82735b807a8af939f1b0603418d8250f589b29c5342c1f5cec0f858c29460ecdf4b04cf5777b145bb01e0edc6099acb70032d0271a8c781827c5e7e7bce5a23c9b829b82ec3433f6a0c9b8723808fb738b45786b63c6de2181618a732c437e340f5691696f18257226342e6c73b368200d7b0f674e06194a590c1c7c1c27e3d7e9add048ab7fe207939ed609f7ec5cee117c00174b3b8fbc118a4716dc1266c9dbfb2256be93df43da7d77f0116ed55815677fbedc926f8852cd63095858713b87660f03e5b7a2163845dee697bd01e42ec19f63c2ba40a14da8a1248d75b6cc8381af29e54e731c08ae692e398910b0e2139d2201a4550732da435ccd1ddcfc45d23a2b468eb3664707651f19d39d1429f2c7076ed4e903f243afec132ab49de798c11802820c1c13a39282c65c0eee96cb385c16a1b98575789fad5ffbf77e80cd4324fc20503028c0fa5ff08be82034d09bf0ed57b17f56c6dac7073f1eea1d8eda7c4a6f79858ff4eb1e57e4c7a70b50e4c5791f454a26a50c0ccae9b245f9cc85a4fddf23f4728d4dd2cb4a8fad23eeba2b1da853dd331a90fffaa07e1b07e3c7fa78f2d45fc4ef0637236c37982b47130b5878b8c1f47c415d8d607c358ff51a98f475c20465401ac3b837d1048842d2aefa74dd5af146a22c21fa358ebe490409f417c75d5727417e9aa8b19e9621581da571178001a695fc00872e43e377545f76fafbf750f0bbd347fc7b4a8ae341b34558ca32e91c1c3509b3b458a96cd60453b52a2f4887e657a46dc8a80acc13bf755228bc9b6ae13e3265641336b5da4f38e35e6a0847b0a7ae88af0a9d74beea8383a1a12659fd88061a876b938f50157be790a230b6faf39f2d4f778546530fa96acb66941480146466b1bc5857465c408e7bf56834826ca577a0b277caf3a03175f74bba597409b86e872a30be70a760519ef3a7eb8dc807f61409617f4e2ac1571356c04f62337aa2a046eebcb183237eebdef623e8b411f5818ab09e5c699e0dbf1c1181bd36eb9b0fbbb2588a7d2ddd7b71f9c75099187ee9470bbf60504583d3d8e89f3d1d9101728d99b97717b184b4f1fe7997a66ad5e043ab623630f2e6824ec5b3fa132bb83803b19ae7266ae76f0377c702b3f20a97e21949cf98bf935777d8eaac74cc5a3a4b29baf6f80ee96e306b05981ac742164626d4d8dbf38dea91444ba47ec48b84f4dcd8a0047836eae8a88c78165ca32fb15d5b97beea65ea83e6dfa30e1d53cb360f465e5691b686df09279747717354478790b45cfdfa13f06e08e2e1689cf5207fbbeeefc181a5200bb4b96595a18ebbfacbaf5efe11d0f5b982b3940826e031983cfc999a3adca34bab6dba184249ab97d2812ba369c911830330b39ec33b7a5636435948c20131a95e5489817b4932aa6c84a82581bbae8c89c74b399799f12bd2b9d94319e397c8efd66089c9999dd4adc4d08f6946a96e3fd62406e70a6f38c6fb2aa5b4eae88edf77b34afdbcc0458348e29a4842604a19f424ae2899562b1e52c4af87f1ae9e1969461c7ef9d06d82d79b69256a70d7000198a2f686f9be7b344ed6ef853b82ff1eeb7b40d60ed81d8be55d4268d304c5c181ca10fbd81d3360ea741494330acd37487be6fcd5032306d4a8ba732249ea65c9add5868bfd62e0ed405c641b381fb0906917a693953da672736222cc7a083dbf7f1d0c224b4be02a468fb401abb47652c2589e6678ec4ba60366a071b8cbc0d220cafea103dd2fc1b91e5f3245056fd52b3e75b34549d674ce400dbb8b1e680df708a57af11b14e4f9c374639a1951ce414da1fb7179fd7a30566fa3e72a225103291088598630e84e7b473dcd57f4e8198771bb0d942f9a3765d0fb694c16634e59b96f18d00076bf16b93b289ab20da29870a4158c6e97488260d94edb36fa488e0b9289e49988201e1768e96ea66c6e8239315cf4ab2634593d4aef7c134aa3b34387a8c044f6cdcc46e09b0778b48c62f31421edcc1f7ecb8b6c1db64103a3b5322590f91c14bd17ebde27e2052d0cc31cac5fd53dd47b2beda967dc9e751ced0c836b36421ea85d4bcb59f21f9a62aece6a7de30acb8f31129ae04fc394a68d8fadacd742dd5d8945a9984f13314575128632b73a2cbccd0fce3b28e6d872205ff56f343898f5746119704483feae85c4a045a07913f5cab82ee64dae5af5227f39376e1397b40df9ba4f54e43a944cd5a75bdbb2d351178dcb40fd0b92ab5502c7f150ee785c39977a5abed597de988c63db9d7826f77ac446c4efe5eca43c899b77ce65b1b12b1928c8253cc0c3e22ce0404eb529f267c886a8c092ad5378f172f7571f51db1f41cc2a67305d476073890af1a2df3e0f2c90f9902c26dd25b91e3274b17ba66f7a298586fd5e819c869fa86895863a2787c2df287ba72392bcda28932414c3006670a985c719b6f2fce5a0f71c9f61113150901a74eaaa5e87eb9eddce7edf23641d6717973e7ba26392d1b2abea97d1ac8f94fe18c007cc000fe813a57b8821e947edebb850f019b4f53315a6acfa1841db21ae03021bbba70feb26cbbfa2aacb64e35c9f70b29388f725831517fd557eb1860f27050492eed9858a9d6bf2b04ad2d0b0d336d120084810c8c5bdb96af52298c3cbcc9f84127d7ef08172ea6cde5e5f16be273a4537fa157449960821cf0153eb763fead36a8566703604a439a495dd9ca8ac35c433ff0627f157b7ab1bab1840ca7eb700cf8c590b6861f5f84a552aac9dcebe4dcaceaba10bfafd0649c805bb8046ed8d2f108441f1b5a4528f70308694e92a5dc419ced3ba596d014a55edbccf6bccf979a5a5e5ede96ba7f2cd5808cf004d9e73a9d86afd4c496b8f81d4a91b3af4adc8f38bedc7690183b0d3729a2c2584237960e526e720a676ca50248b61d43efc9c202b75334f0946e39acd414866b1e92525f3f5f15af0b544acb4a6f145fd414134cf676072a143fe17019a416d7a16192191c0b65939017e85fbb78846573116777c4960bb321a8365671bc17a526324581ef803773da29bc4ab0e70b349ba7f6f69290bfda302dc1e5537250b8cbf7bc5611944881b3105e593e82f5301388c2550f59f4e904e267669eed7a9174364ab29d2325fdcb93e0f441099420b48e9429d1053bd25172e12ed417b4328196d6f5f396ae31d6dd83731c333e8611ccfbc70ee259578aece74bd1d1a17cb4083849747c42bf99837eb5d842fad2606bca61d8ae5a3bcc3951407d2089dd67b4d705b2173019188458ffced4250b841fda1f30a3aab200ce674d5eba517c73be13d17481595613b9673b5422bf3c439d4c303c174d17e54d3acc34be56ce760d412e77b51f8444dd393161a5b48397a260234363b3f7a22496c70b307785f0b26498c22f55bd373f5a5136a1edc35f973107fe9b8a62109077e214b7e2347d1b2a4f27e40095322b4632e7d3c2a9d7b980050fe8537386504d695671e007409809ded15b258b88571be3935ba772e29c1e39baa451cccba189e250237d3884243feb6e6a75cdef51881fd64816617939fd4e0963d0f1dc203b5d4d96f69ad951bd6e36245dc419359e7b4879bd1189bccdc90ffa9ba2443ed6298fb53eefaf1d567472985e3aa058c9ad08818f52a058bd1b14dd7185321f9761690d66cad7c5acc75ae63a7ad6a62d330a556721140e087220432803c5309ee7c8542799137e2ad2d000dbd3c0ed6a856df86da1ab0546000afe4537bf420452d423fe06bb2da0b281c56e2b545726df8d2884675fb2b52bfc071ffa1b70ec3e65bd0d0c65b1f67067044a85b66b5bb2512907b658806810c52f0e24c5239b5fd70eab741b79c2ac00758be39b7ebff8d1ead76328a81fce64dd0e4733cebd8dafbb00cdb5282dfdb9f2182bf687ec4ac96b6808d07b2ac27c2e44a5eba136eb9236f0d25925900ed251e594022a7969e042d71a139ba6bcb83b0d52a6709c3d58c31b3147c46f5afc25f867362523272313d5e37e43372789be6aafbd91879dc4ccc410e9775ea0b1c30f4862c592b39497937887d39cbba9a43db567bdf1ff04abc22b294c577cee6302b18743e6672ac32697f4ddd003813a4ca81d123dd7a5e7c5d556720b08174b075dcc1841d327093f7216953ce1663c776ef9cb947599de94f815739429ad455d23b372ac405124f95099b1e23287a42c3fd2f1279070a7f78dc399beefc5e4b35301fe54fcf59b8233267b9d160fc46d3e082235bb395970d8158d40e1edca9a45868e1ff42f8d8e6064f6201c99345438bc6e79f0f2ab9fe5240aca42a68cc376d121d42ebf64e0d89be93a9ff725c57bf44f83dfebd05a27a22d6a7817edb695b9b2543f890045fdcd55fe2a0f4de2c408c007835a905c6a17ae2ea5820f7c59f135b16de5eb2e3d5ad6c5580482b4db689e22d05a9b326cda4531c2d0077846faf6394a78c1cd5bd7f71557778a0546f06d6d762c69b2d5a54b5252abdf64ed00d6cf3669353a663e139d2fd588c0496d6379aad08dc41747b36c97c790b75e1516feaecb00ffb9061de5b47cd5592254426a749488be0cdec494c2336387fd1d4d768588ee5992830999b9de0b1c729516413920f3924d60d73e1edb6defc1852f01c2e3cdb0d09adaa94ce90dc4a5b672cc85b13c89e4126b668710d3ca1a941820cb29fa61e8658c1b9f71b4a1889a6c81bb2d6ad8fc425e854b05730950eaa44865bac33372dfc1ebdf552634fa64774ff3ea99ce0b25fb53b81c2779d94bf50ad0eeb2993cd53270aad3d6a557fb38215394d6bd8752eae597a9fa26c705d208031321a555f870f1f9fded6a2ec79723821d93f305203752018d6fe14b7c2384909a024d2118ec62ec11068f227e887494032d5623ed8cc44ef2d4d1331ef0171e4274065bead47f163c05461f0c0716034a9d2c29055d9ad4277f86e0664ab99547cb20b2eabed8160c800b950f4b252c7d5eb3b0148e11a104e568e88ad6e978325065a8e2adb8945b52dcd98d29a49b9188b5d6442f0456823631782862b32dbaaa9d2396049dfe3b4d03ad0bbba8917311783572246bd1742507b386ff697756bf9e0f67df74950f72b11183206f71cf3b9b58f010a3d999ef7bcb78847b6f8168fa32f15607ecec70503647b5f5fd7c7e97bd37af752737975d8689df66e0b875bf59709d7adccd7f661b1689a1e3e36d59577352f919e7b48313d12bc6bc825391c06b1e61515f7023fa1b83a6ef30e66c64df4791f4eb8d5080583fe65a7f315aa0fab2e4d8d1a7b039c131d061a974d0d0912ca75f1da45c411535419ec507e8f4101ab5025e2cc6874dd3c0d5fefa90d5fe4d0173f5717d1c7bde818e51b7c4e1c3b1bde739d53ed64bf481b9f60667bd6c4f35802502a0e1f08bc87f9c9131cbf439d3712beb5885ca92e747b668a76bf82ad6d151b33a10ea8241317fccb40b4f1bee49ec90a7acc9d8389a6ae90d0ed6a5fe4ff2ff44464084e3433f800c2623a96d8ce76e95223e450a2cac1b4d0c9e67ed28b0a68ae45e68711fe7ee670d49433ef6ebe92fe7e30b9a944b9171f1a805d8805fd6d050cf5eff6ca716d029196f324e401caee79b211fb156506eb7bbced68d88d9596fef16548591ca2341974fe265db90e55bc889838b313cc8bd9be04a8ec2f87eb61bc934f3935edad9519326a53c77d313d848c75f22b81d093b622c42724f7832aad2645ad84c1bb9b26129227a8493eb94f06294abb7dbb27e87f0a0cc0b084dd65302c43e0c525281db5571857b21bce9168f130cc8ba37298f1dfae0b2cbced074282f02d71b822ac040d3516d58496c0faece90337cd89950bce32f55792283a3406afad091efac9f3a49a2cfc8d16fe52084cbf5565055280fffc318e6cd94e172c4d7493ee3013c561865c44396a00709f4316013e931b524b32bf39ca6e75c82e143e990d9d12c9ad7f300f853812ed0be98427fd049cd48cc3dbbe8277c0680a12a4083501db3abb2fdd90f9115e503d10439875ae11c7729fd29176f2b3f6a3c00e086394b06bd180e3913854fcdbd1860eca64e3c4aad0e59cf9bb43faef549b2c4888827acc38bb2963983b641b1954134a0faf1546614afdb04fc2b8b5ad1c60658d6655360d2587c44c97fa6c4bc490edcf38f292a6325d1bc36e23aa5542af5ccda51ee917c27a73a0992914a2719a3ad19cf2c343654ce79d417ed8e00765515408a4737f6b85e2bb517056d4671628dfe3ee21f6f5c43b1c95d2854cd15fdc14a9a28a93bdb2baea1507c39293d7ea5370de80db7db9fe53e18f13889b0f57b52f51fff0143c390568f1fe6fdca50e8678fcf7c8dc7374738e87462103e94689379a74a203ad2de167c86333cbc774d21c7fadc6c6988cd5e099704fbbf7b46d0ae101353031d010a7ac5c3a5dd72e23e3f13971cfede89d2d43f2a643f3115cfbd6e98ed2b08b726d55f505baa118c3446fe2a4c550c0618aa1ad7536f6476484ae3ba31b59536dd75af068c0e8eb3e4b6bfd223cac7325092b49a680b13e82e86a5ce66daf8f5947fb999d81c380f084c7e2103bbafe9e4ec06fc1263355d6f8af85ebebae8ba1ec48a8239b8520783d88ae7f3f1c09bf21829c99b42d3b51fd99453a4ea7df09adfec4b6195d034ead9a82389ee96fa7f1588ab4bf04900cff74ecb6f1523e9413dc7cfc8bd3dde04a3b2032e66cce623f9df8ae1ce6c4094f6ca191f5d9008b71e18f93e1584f4bdcb89a71d3911a07307ef4b0a75fb5a5e6e1e034220bd1f7d55138b366bd3547885c2c33f469fc3f866fda7179f7e5cb35ac9fb8a1de7321af1b4fdc2a6af115f8cf63ad6a90330233d65f08a9c3d7199f7f2b1182564ad2bfdbdebeb9cf6bf6764b20db75add04620cefeb077c94c80efb73c7d05cde4c722e5fcd0b44a152147933b4283666ad254375034c9c94c026a50ff9d3a9f5339036adac3d5714305eb3e11cfe99cfe4d59a1f6c483011386cd7395d3070469a1ba8dcd602aa2fc7344903f78986a6a4e2d57530665752aa86c96b245b3128a08d106fafc4ffad62dffc3b85103d9f07f13ebbc8362dd27e684beba8cb7c82720d295715fc445c6a7f77162965630f5965ef62e61f3bd6df8ee674b57248d7c300ff410878892b2268467bc5eee215eb386e9dad4c3bd726499884d416f2e6e643085deb716877e5dc82c757c2c165101a8f63c52c671f429b06d71665a98729bca97092bcf1e95f3984d45f2a90f2c2b6b2f2a99b56d3d76d87780500c46be77f27c095c87a5ec307228280b6bee6a110b158b", 0x2000, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 382.734065][ T7812] device veth1_macvtap left promiscuous mode [ 382.742289][ T7812] device veth1_macvtap entered promiscuous mode 20:07:03 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) 20:07:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:03 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) [ 382.770183][ T7812] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 382.825952][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 382.841932][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.849596][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 382.861346][ T459] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.868246][ T459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.875893][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 382.884210][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 382.892749][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 382.900916][ T7842] loop5: detected capacity change from 0 to 2048 [ 382.901329][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 382.915390][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 382.923935][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 382.932150][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 382.944651][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 382.952987][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 382.961289][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 382.969504][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 382.978001][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 382.986205][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 382.994733][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 383.003205][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 383.012116][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 383.028155][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 383.041459][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 383.049546][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 383.057975][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 383.066188][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 383.074660][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 383.082930][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 383.090879][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 383.099111][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 383.107306][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 383.114857][ T7828] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 20:07:03 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) [ 383.133015][ T7828] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.212156][ T7842] device veth0_vlan left promiscuous mode [ 383.217909][ T7842] device veth0_vlan entered promiscuous mode [ 383.224578][ T7842] device veth1_macvtap left promiscuous mode [ 383.231175][ T7842] device veth1_macvtap entered promiscuous mode [ 383.237750][ T7844] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 383.276852][ T7847] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.283697][ T7847] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.296444][ T7847] device veth1_macvtap left promiscuous mode [ 383.303082][ T7847] device veth1_macvtap entered promiscuous mode [ 383.309827][ T7847] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 383.325929][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 383.333613][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 383.341043][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 383.349459][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 383.357810][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 383.365854][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 383.374041][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 383.382101][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 383.390125][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 383.398249][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 383.406346][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 383.414328][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 383.422185][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 383.430594][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 383.438494][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 20:07:04 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) 20:07:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000), 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:04 executing program 1: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0xc2f3735ed2c00c79) 20:07:04 executing program 4: fspick(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0) 20:07:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:07:04 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) 20:07:04 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) fspick(r0, &(0x7f0000000100)='./file0\x00', 0x0) 20:07:04 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x189) 20:07:04 executing program 4: socket(0xa, 0x1, 0xfffffffe) 20:07:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000), 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:04 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/4096, 0x1000, 0x2b) 20:07:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000005000000850000006d00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r0, 0x0) dup3(r2, r0, 0x0) 20:07:04 executing program 1: memfd_create(&(0x7f0000000000)='z\x17\xd2\xd9a|\\\x8eb\xa2{\xa2\xbbv,\xceN\xeb1\xf2<\xb7\xb2\xe1\xb6]\xf2\t6\xc2\xb3\nE\xb3\xd4\xe6\xa1\xf4m\xa1\xcc\x85L\xf0\x80tFUFL\xd3\x88\x034\xb3\xa0\xe3>\xceK\xf6?{\xffa\x06\x8d\xcc\xfe\xc5a\xb6\x7f)\x8e\xf3G\x14\xbcQ0K\xbc\xfdf\xe9E\x8d.\xf6^\x10\xb5\x13\xbdU\xef\xe9\xba^\xdbs\xce\v,m|\xc8\xfd\xb4:\x8d;\x8a[h*\xb7\xd0\xe7+\xd3\xe0tN2\xa5L\xe9\x19\xa6\xb7\x1bJ\xa41r\x8e\x8f\xd7D\xed\x9cr\xf5\xe0m\x11\xf6\x84\xf24q\xfc\xb7\x13\xfa\x89\xf0\x9f\xa5\xe9\xa9\xd6\xac9\x8dAc\x9f\xd3\r\x80\xd2\xe5\xe7\xf7\xda\xbd\x8d\xee\x12\x7f)WQ\xab\xca\xe3`\xb2\x18%z|\x1c\x89\xe3\xdb1e\x18\xe9%\x06e G\x93\xb9\x7ff\xaaFV\xc2\x98\xb1\x97\x18Sb\x82\xea\xe0\xbf\xed\xcc\x02\x90\xb9k_\a2\x896\xa9\xc0\a`\xdd\xb4\x13I?\xd0|\xb7c\x99\xc0~\xfc!\x03B\xb6\b\x8c\x9erB\x1d\xe9%\xb7M9r\"7\x92\x9e]\x84\xf2\xa0Y\xf4K[\a\x1f\x97\xa10c6\x1a\x17k\xa2\xeb\xb0\"\x00u\x8d\x1ap_\x18;B\x87!\xe6\xa7st\xf1\xf8\xe3uq\x14\xb8\xf3\xef\xbc\xce\x9dbq4#*2\x99\x99\x06\xc2Q\x90H\xd6\x15\xd3\x8cD\xb0\x16\x82q\xbe\x96\xdc\xac\xd9\xc6\xe0\x19\x8e%\xa7\x92`3\xe79\xbd\x1f=\x8e\x90D\x94\v\xc5\x1c75L`\xb5\x1bj\xca\xdc\x8c\xea\x9c\xe8\xfe\x9fu`Z\xef?`\xd7#\x83U\x04l\xe9\x9at\x8afU\x84\x05J\xaf\xceM\xaa\xda@\xfb\xdf \xf3\xe0\x8dE3\xf2\xee\x10!Z', 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) 20:07:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:04 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x2b) 20:07:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) fcntl$addseals(r0, 0x409, 0x0) [ 383.778296][ T7884] loop5: detected capacity change from 0 to 2048 [ 383.929317][ T7884] device veth0_vlan left promiscuous mode [ 383.935193][ T7884] device veth0_vlan entered promiscuous mode [ 383.941897][ T7884] device veth1_macvtap left promiscuous mode [ 383.948331][ T7884] device veth1_macvtap entered promiscuous mode [ 383.955324][ T7886] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 20:07:05 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000002040)='.pending_reads\x00', 0x101040, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0x4008662c, 0x0) 20:07:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000), 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x2b) 20:07:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:07:05 executing program 1: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x1e00, 0x0, 0x0, 0x0, 0x0, "d83a05fe140676e94163665b59f01f3ba1f5a9"}) 20:07:05 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:05 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x5421, 0x0) 20:07:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x2b) 20:07:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:05 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:etc_runtime_t:s0\x00', 0x23) 20:07:05 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x0) 20:07:05 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x40086602, 0x0) 20:07:05 executing program 1: r0 = io_uring_setup(0x701, &(0x7f00000000c0)) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x18, &(0x7f00000004c0)=[{0x0, 0x0, 0x0, 0x0, 0x0}], 0x1) [ 384.573526][ T30] audit: type=1400 audit(1686427625.156:238): avc: denied { setattr } for pid=7912 comm="syz-executor.4" path="socket:[38767]" dev="sockfs" ino=38767 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 384.612204][ T7910] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 384.671477][ T7920] loop5: detected capacity change from 0 to 2048 [ 384.735676][ T7920] device veth0_vlan left promiscuous mode [ 384.741564][ T7920] device veth0_vlan entered promiscuous mode [ 384.751097][ T7920] device veth1_macvtap left promiscuous mode [ 384.759968][ T7920] device veth1_macvtap entered promiscuous mode [ 384.768100][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 384.775379][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 384.782916][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 384.791341][ T505] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.798301][ T505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.805672][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 384.813997][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 384.824504][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 384.833015][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 384.841907][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 384.850148][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 384.858539][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 384.866688][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 384.874613][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 384.883067][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 384.891308][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 384.899520][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 384.907805][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 384.915993][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 384.924320][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 384.934035][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 384.941957][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 384.949965][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 384.957912][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 384.965717][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 384.973951][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 384.982136][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 384.989955][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 384.997810][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 385.005044][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 385.012485][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 385.020737][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 385.028832][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 385.036393][ T7921] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 385.049584][ T7921] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x0, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:07:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x0) 20:07:05 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000300), 0x40000, 0x0) 20:07:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x10, 0x0, 0x27) 20:07:05 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, 0x0, 0x0, 0x0) 20:07:05 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:05 executing program 1: r0 = syz_io_uring_setup(0x778a, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 20:07:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x0) 20:07:06 executing program 4: getgroups(0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xee01]) 20:07:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, 0x0, 0x0, 0x10, 0x0, 0x0) 20:07:06 executing program 0: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) 20:07:06 executing program 4: syz_io_uring_setup(0x778a, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 385.429725][ T7930] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 385.587879][ T7948] loop5: detected capacity change from 0 to 2048 [ 385.628409][ T7948] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.635302][ T7948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.665250][ T7948] device veth0_vlan left promiscuous mode [ 385.672008][ T7948] device veth0_vlan entered promiscuous mode [ 385.683413][ T7948] device veth1_macvtap left promiscuous mode [ 385.693025][ T7948] device veth1_macvtap entered promiscuous mode [ 385.703646][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 385.711299][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 385.722356][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 385.730848][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 385.739260][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 385.748013][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 385.757964][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 385.766042][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 385.774168][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 385.782467][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 385.790693][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 385.798750][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 385.806960][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 385.815258][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 385.823331][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 385.831589][ T7949] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 385.848173][ T7949] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, 0x0, 0x0, 0x10, 0x0, 0x0) 20:07:06 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x1010c0, 0x0) 20:07:06 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private0}}) 20:07:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x0, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:07:06 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000056c0)={[{@lazytime}, {@heap}, {@lazytime}, {@nobarrier}, {@four_active_logs}, {@data_flush}, {@resgid={'resgid', 0x3d, 0xffffffffffffffff}}, {@six_active_logs}]}, 0x1, 0x54e6, &(0x7f0000000140)="$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") 20:07:06 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$nl_route_sched(r0, &(0x7f000000e600)={0x0, 0x0, &(0x7f000000e5c0)={0x0}}, 0x0) 20:07:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, 0x0, 0x0, 0x10, 0x0, 0x0) 20:07:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fchmod(r0, 0x0) 20:07:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0), 0x0, 0x10, 0x0, 0x0) 20:07:07 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0xc020660b, 0x0) 20:07:07 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000002040)='.pending_reads\x00', 0x101040, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0x6609, 0x0) 20:07:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0), 0x0, 0x10, 0x0, 0x0) [ 386.362238][ T7956] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. 20:07:07 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r1, 0x1, &(0x7f0000000e40)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 20:07:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:07 executing program 0: syz_io_uring_setup(0x6f8, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x0, 0x1f0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) [ 386.523737][ T7985] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 386.537738][ T7986] loop5: detected capacity change from 0 to 2048 [ 386.575690][ T7954] loop4: detected capacity change from 0 to 40427 [ 386.583092][ T7954] F2FS-fs (loop4): Invalid gid value -1 [ 386.690514][ T7986] device veth0_vlan left promiscuous mode [ 386.697310][ T7986] device veth0_vlan entered promiscuous mode [ 386.707378][ T7986] device veth1_macvtap left promiscuous mode [ 386.716313][ T7986] device veth1_macvtap entered promiscuous mode [ 386.725482][ T7987] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 20:07:07 executing program 0: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0xd1c) 20:07:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0), 0x0, 0x10, 0x0, 0x0) 20:07:07 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001180), 0x2c0803, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 20:07:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x44, 0x5a, 0x20, 0x0, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x44}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:07:07 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000056c0)={[{@lazytime}, {@heap}, {@lazytime}, {@nobarrier}, {@four_active_logs}, {@data_flush}, {@resgid={'resgid', 0x3d, 0xffffffffffffffff}}, {@six_active_logs}]}, 0x1, 0x54e6, &(0x7f0000000140)="$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") 20:07:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x10, 0x0, 0x0) 20:07:07 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") 20:07:07 executing program 0: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/keycreate\x00', 0x2, 0x0) 20:07:07 executing program 0: clock_gettime(0x6, &(0x7f0000000940)) 20:07:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x10, 0x0, 0x0) 20:07:07 executing program 0: syz_io_uring_setup(0x0, &(0x7f0000001200), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000001280), &(0x7f00000012c0)) 20:07:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x10, 0x0, 0x0) 20:07:07 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) [ 387.286998][ T7997] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. 20:07:07 executing program 0: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x9, 0xfffff21b, 0xff, 0xfff, 0x16, "12fcb6d0f620ad4a605d58e7444aa5497a7d3a"}) r3 = dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f00000000c0)={0xffffffff, 0xfffffffc, 0x7, 0x1, 0x17, "dac61d40b966d8288bd2e8283d35294dada6bb"}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x80000000, 0x0, 0x0, 0x7, "d83a05fe140676e94163665b59f01f3ba1f5a9"}) 20:07:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) [ 387.431644][ T8021] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 387.535419][ T7993] loop4: detected capacity change from 0 to 40427 [ 387.542138][ T8022] loop5: detected capacity change from 0 to 2048 [ 387.549178][ T7993] F2FS-fs (loop4): Invalid gid value -1 [ 387.736476][ T8022] device veth0_vlan left promiscuous mode [ 387.742389][ T8022] device veth0_vlan entered promiscuous mode [ 387.749132][ T8022] device veth1_macvtap left promiscuous mode [ 387.755543][ T8022] device veth1_macvtap entered promiscuous mode [ 387.763261][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 387.770550][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 387.777910][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 387.785821][ T459] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.792576][ T459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.799788][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 387.808155][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 387.816111][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 387.824274][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 387.832065][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 387.840017][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 387.847849][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 387.855787][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 387.864018][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 387.871978][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 387.879923][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 387.887808][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 387.895790][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 387.903976][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 387.912029][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 387.920525][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 387.928269][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 387.936049][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 387.943931][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 387.951746][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 387.959939][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 387.967996][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 387.975666][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 387.983460][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 387.990789][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 387.998060][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 388.005957][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 388.013998][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 388.021406][ T8024] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 388.035492][ T8024] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab", 0x3a, 0x10, 0x0, 0x0) 20:07:08 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 20:07:08 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}]}, 0x3c}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:07:08 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000056c0)={[{@lazytime}, {@heap}, {@lazytime}, {@nobarrier}, {@four_active_logs}, {@data_flush}, {@resgid={'resgid', 0x3d, 0xffffffffffffffff}}, {@six_active_logs}]}, 0x1, 0x54e6, &(0x7f0000000140)="$eJzs3MtrY1UYAPAv7XTejkVcuJsLg9DCJEw6D3Q36gw+sEPxsXClaZKGzCS5pUnT2pULl+LC/0QUXLn0b3Dh2p24UNwJSu651akPEJo2dvr7wc13z8nJd78ThoHv3pIATq3F7JefKnElLkTEfERcjijOK+VRuJvCcxFxNSLmHjsq5fwfE2cj4mJEXJkkTzkr5VufXR9fu/3jGz9//e25M5c+/+q72e0amLXnI6K/mc53+inmnRQflvONcbeI/VvjMqY3+o/KcZ7iTnu9yLDT2F/XKOLNTlqfb24PJ3Gj12hOYqe7UcxvDtIFh+POfp7iAw8bW8W41V4vYneYF7Gzl+ra3Uv/t+0NRylPq8z3YZE+RqP9mObbu+20n81HRWwORuV8ypu32ruTOC5jeblo5r1WUcf6Yb7p/7c3u4Pt3Wzc3hp280F2u1Z/oVa/U61v5a32qH2r2ui37tzKljq9ybLqqN3o3+3keafXrjXz/nK21Gk2q/V6tnSvvd5tDLJ6vXazdqN6e7k8u569+uDdrNfKlibx5e5ge9TtDbONfCtLn1jOVmo3X1zOrtWzt1fXsrW37t9fXXvn/XvvPXhp9fVXykV/KytbWrmxslKt36iu1JdP0f4/Loue4v7hUCqzLgDg5NH/A7Nw0vv/0P9PxYnqf097/38E+4dD0f8DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJxa3y988VpxspjGl8r5p8qpZ8pxJSLmIuK3fzAfZw/knC/zLPzL+oW/1PBNJYoMk2ucK4+LEXG3PH59+qi/BQAAAHhyffnR1U9Tt55eFmddEMcp3bSZu/zBlPJVImJh8YcpZZubvDw7pWTFv+8zsTulbMUNrPNTSpZuuZ2ZVrb/ZP5AOP9YqKQwd6zlAAAAx+JgJ3C8XQgAAADH6ZNZF8BsVGL/Ueb+s+DiL+//fCB44cAIAAAAOIEqsy4AAAAAOHJF/+/3/wAAAODJln7/DwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4nZ37yUkdiuIAfFroe7w/RmKcuxVnsAyX4NChYQFugiXgFtwAa8CZSzBgaEu0BhOT3raRfF/SXm5DfpwSJudeUgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADo0nOxmj/eXz20zdnu2klzNwAAAMAxm2I1L19Mq/m/+vpZfeminmcRkUfEsd59FL8amaM6p/ji/cWnGp4iyoT9Z/yuj78RcV0fr+ddfwsAAABwutaL5azq1qvTdOiC6FO1aJP/v0mUl0VEMX1JlJbvT5eJwsrf9zjuEqWVC1iTRGHVkts4Vdq3jBrD5MOQVUPeazkAAEAvmp1Av10IAAAAfbodugCGkcVhK/OwF1z+8/59Q/BPYwYAAAD8QNnQBQAAAACdK/t/z/8DAACA01Y9/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAubYrVfL1YztrmbHftpLkbAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4I39eUeBEAiDMNi7vjOZ+x9WGjQ1NakC4eNvDAYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgDe/+8v/ialxJpl7bSw9jyRrp8bWqbF3bhz9YXz9GgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALvbnJQVCIAiiYM7430nf/7CSoGcQIQIaHlXUogEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgi373y/+JqXEmmTttLB2PJGtXja2rxt6DxtGD8fZvAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALnbu5zWOKg4A+JuZna2timuUPUREwYNe7HZbW3v1oAQP/glCSLc1uvVHm4MtRcjFm+Sci+hRRFDiLf9DzgnkEm857CGCZ2VmZ5LJD3A1dGaTfD7w5n13GOZ93ySEfOe9BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoDR67yBOskNnHMfFuc29JwtZv3Wkz6yvbM9mLYujOpM+G16tfoi6zSUCAADAxZGU9X0IYSddm8v6uJPX/2l5TVbz//D8OC7r+aN1f9mXtX/Wfv9t9+X9gTrjcbKb3l0cDq4dT6X19GY53V741yta+ZPP370k+Rck/nD5pVGaP8/ou42N99t5eKmObAGA/+Nq2RdB+ftQ1vebTAyAC6NVKbzL+j/pNJsTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQB1Gy+HZMo5CCLOtgziztfdk4aR+fWV7tmy3VldXqvfMbpGGEO4uDgfXapzLtHv46PFn88Ph4EH9wWshhOZGL4KPJ7gmhCYzFJw2iIvv9WnJ52wEDf9gAgDg3EmLltX1O+naXHYumgnh7x8P1/9vVuIwYf2/+8mtzepY1fq/X9sMp19v6f6XvYePHr+9eH/+3uDe4PN3rvff7d+4ffPm7V7+rqTnjQkAAACn0y5atf6PZ46v/1+pxGHC+v+r7/vfVMdK1P8nOlj0azoTAACAi+3F1//6MzrhfNRuh6/nl5Ye9MfH/c/Xx8cGUv3PLhWtWv8nM01nBQAAANRhtBwdWv+/U4nDhOv/z/30yi/VeyYhhMvF+v/VhS+Gd+qbzlSr48+Jm54jAAAAzbpctOr6f5rv/4/3tzzEIYS33hjHxb8BnKj+Tz749ufqWNX9/zfqm+JUirvj55H33RBa3aYzAgAA4Dx7pmhZsf9Hujb36a9XPmrb/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABQt38CAAD//7HmQWY=") 20:07:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab", 0x3a, 0x10, 0x0, 0x0) 20:07:08 executing program 1: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xfff, 0x0, "12fcb6d0f620ad4a605d58e7444aa5497a7d3a"}) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:07:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab", 0x3a, 0x10, 0x0, 0x0) 20:07:08 executing program 1: syz_emit_ethernet(0x5a, &(0x7f0000000600)={@link_local, @link_local, @val={@void, {0x8100, 0x1}}, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "504c386e03f7a1d313f57c669b9a78b91355b4a2357ea14847bfb41b10f53836b334d97e698cd98010107e83afe334a03272cab70f75d1a96e89315ea767e4bf"}}}}, 0x0) 20:07:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x10, 0x0, 0x0) 20:07:08 executing program 0: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x9, 0xfffff21b, 0xff, 0xfff, 0x16, "12fcb6d0f620ad4a605d58e7444aa5497a7d3a"}) r3 = dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f00000000c0)={0xffffffff, 0xfffffffc, 0x7, 0x1, 0x17, "dac61d40b966d8288bd2e8283d35294dada6bb"}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x80000000, 0x0, 0x0, 0x7, "d83a05fe140676e94163665b59f01f3ba1f5a9"}) [ 388.239148][ T8035] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. 20:07:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001100)=@base={0x17, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) 20:07:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x10, 0x0, 0x0) 20:07:08 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x10, 0x0, 0x0) [ 388.404624][ T8055] loop5: detected capacity change from 0 to 2048 [ 388.437606][ T8058] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 388.440076][ T8036] loop4: detected capacity change from 0 to 40427 [ 388.477341][ T8036] F2FS-fs (loop4): Invalid gid value -1 [ 388.529676][ T8055] device veth0_vlan left promiscuous mode [ 388.535924][ T8055] device veth0_vlan entered promiscuous mode [ 388.556718][ T8055] device veth1_macvtap left promiscuous mode [ 388.563482][ T8055] device veth1_macvtap entered promiscuous mode [ 388.588373][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 388.595668][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 388.613763][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 388.629096][ T480] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.635980][ T480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.643515][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 388.651748][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.659867][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 388.668261][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 388.676189][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 388.684228][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 388.692211][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 388.700364][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 388.708333][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 388.716561][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 388.724490][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 388.732543][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 388.740720][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 388.748948][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 388.757044][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 388.765208][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.773064][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 388.781181][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.789126][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 388.797077][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 388.805285][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 388.813601][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.821602][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 388.829487][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.836921][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.844244][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 388.852266][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 388.860554][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 388.868232][ T8064] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 388.885923][ T8064] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}]}, 0x3c}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:07:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) flistxattr(r0, &(0x7f0000000280)=""/176, 0xb0) 20:07:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x10, 0x0, 0x0) 20:07:09 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:09 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000056c0)={[{@lazytime}, {@heap}, {@lazytime}, {@nobarrier}, {@four_active_logs}, {@data_flush}, {@resgid={'resgid', 0x3d, 0xffffffffffffffff}}, {@six_active_logs}]}, 0x1, 0x54e6, &(0x7f0000000140)="$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") 20:07:09 executing program 1: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x4, 0x0, 0x5, 0x0, r1, 0x0}]) ioctl$TCSETS(r1, 0x5423, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7, "d83a05fe140676e94163665b59f01f3ba1f5a9"}) 20:07:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x10, 0x0, 0x0) [ 389.115020][ T8071] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. 20:07:09 executing program 0: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x9, 0xfffff21b, 0xff, 0xfff, 0x16, "12fcb6d0f620ad4a605d58e7444aa5497a7d3a"}) r3 = dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f00000000c0)={0xffffffff, 0xfffffffc, 0x7, 0x1, 0x17, "dac61d40b966d8288bd2e8283d35294dada6bb"}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x80000000, 0x0, 0x0, 0x7, "d83a05fe140676e94163665b59f01f3ba1f5a9"}) 20:07:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x10, 0x0, 0x0) 20:07:09 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:09 executing program 1: syz_open_dev$usbmon(&(0x7f0000000040), 0x7, 0x0) 20:07:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x10, 0x0, 0x0) [ 389.263511][ T8086] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 389.283515][ T8072] loop4: detected capacity change from 0 to 40427 [ 389.295102][ T8072] F2FS-fs (loop4): Invalid gid value -1 [ 389.298862][ T8089] loop5: detected capacity change from 0 to 2048 [ 389.374830][ T8089] device veth0_vlan left promiscuous mode [ 389.381138][ T8089] device veth0_vlan entered promiscuous mode [ 389.388974][ T8089] device veth1_macvtap left promiscuous mode [ 389.409759][ T8089] device veth1_macvtap entered promiscuous mode [ 389.429969][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 389.445492][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 389.453238][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 389.461578][ T459] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.468470][ T459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.476241][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 389.484649][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 389.493946][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 389.502840][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 389.510975][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 389.519192][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 389.527391][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 389.535424][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 389.543650][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 389.551850][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 389.560031][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 389.568387][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 389.577027][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 389.585303][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 389.593805][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 389.602457][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 389.610592][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 389.618778][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 389.627036][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 389.635200][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 389.643948][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 389.653388][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 389.661496][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 389.669573][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 389.677196][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 389.684541][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 389.692938][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 389.701272][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 389.709299][ T8093] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 389.728266][ T8093] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x10, 0x0, 0x0) 20:07:10 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 20:07:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8}]}, 0x3c}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:07:10 executing program 4: socket(0x0, 0x10, 0x0) 20:07:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x10, 0x0, 0x0) 20:07:10 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001440)='/proc/keys\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x1c6) [ 390.024083][ T8100] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. 20:07:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x4, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80ffffff, 0x0, 0x0, 0x0, 0x80ffffff}, [@alu={0x4, 0x0, 0x2}]}, &(0x7f00000003c0)='GPL\x00', 0x5, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:07:10 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x5, 0x3, &(0x7f0000000380)=@framed, &(0x7f00000003c0)='GPL\x00', 0x4, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x142, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 20:07:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x4, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4, 0x1, 0x9}]}, &(0x7f00000003c0)='GPL\x00', 0x5, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:07:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x10, 0x0, 0x0) 20:07:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x10, 0x0, 0x0) 20:07:10 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x4, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4, 0x1, 0x3}]}, &(0x7f00000003c0)='GPL\x00', 0x5, 0x94, &(0x7f0000000400)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:07:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x5502, 0x0) [ 390.170623][ T8114] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 390.196706][ T8128] loop5: detected capacity change from 0 to 2048 [ 390.262071][ T8122] device veth0_vlan left promiscuous mode [ 390.268864][ T8122] device veth0_vlan entered promiscuous mode [ 390.278304][ T8122] device veth1_macvtap left promiscuous mode [ 390.287090][ T8122] device veth1_macvtap entered promiscuous mode [ 390.296152][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 390.303494][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 390.310892][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 390.322707][ T480] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.329583][ T480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.336914][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 390.345175][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 390.353639][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 390.362155][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 390.370074][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 390.378087][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 390.386070][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 390.394075][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 390.401987][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 390.409994][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 390.417907][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 390.425884][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 390.433978][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 390.442179][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 390.450284][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 390.458482][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 390.466299][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 390.474226][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 390.482309][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 390.490227][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 390.498552][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 390.507719][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 390.515563][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 390.523529][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 390.530929][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 390.538337][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 390.546347][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 390.554639][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 390.563853][ T8128] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 390.578346][ T8128] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x10, 0x0, 0x0) 20:07:11 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x894c, 0x0) 20:07:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) symlinkat(&(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') mkdirat(r0, &(0x7f0000000000)='./file0/file0\x00', 0x0) 20:07:11 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = pidfd_open(r0, 0x0) process_mrelease(r1, 0x0) 20:07:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:07:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) getuid() r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:11 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) 20:07:11 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/net\x00') ioctl$TUNSETDEBUG(r0, 0x4030582a, 0x0) 20:07:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 20:07:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$dir(0xffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000000)='.log\x00', 0x193ec0, 0x10) 20:07:11 executing program 1: symlink(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)='./file0\x00') setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 20:07:11 executing program 4: setrlimit(0x7, &(0x7f0000000000)={0x0, 0xffffffff}) 20:07:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='wchan\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r1, r0) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 20:07:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000001100)={0x14, r1, 0x435}, 0x14}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r0) 20:07:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept(r1, 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000002c0)={[0xfffffffffffffffb]}, 0x8) getpeername(r0, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000280)=0x80) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r2, 0x5450, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, 0x0, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) accept$unix(r3, 0x0, &(0x7f0000000300)) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cpu.weight\x00', 0x657, 0xfeffffff) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl(r6, 0x5452, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$NS_GET_PARENT(r7, 0x8902, 0x20000000) socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_NO_ENOBUFS(r8, 0x10e, 0x5, 0x0, 0x0) connect$unix(r8, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) 20:07:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) [ 390.904824][ T8132] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 390.924133][ T30] audit: type=1400 audit(1686427631.516:239): avc: denied { ioctl } for pid=8145 comm="syz-executor.0" path="net:[4026532369]" dev="nsfs" ino=4026532369 ioctlcmd=0x582a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 391.071193][ T8164] loop5: detected capacity change from 0 to 2048 [ 391.116446][ T8164] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.123360][ T8164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.155299][ T8164] device veth0_vlan left promiscuous mode [ 391.161852][ T8164] device veth0_vlan entered promiscuous mode [ 391.172874][ T8164] device veth1_macvtap left promiscuous mode [ 391.182614][ T8164] device veth1_macvtap entered promiscuous mode [ 391.191572][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 391.199246][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 391.207062][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 391.215269][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 391.223650][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 391.231771][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 391.239860][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 391.247842][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 391.255794][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 391.264159][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 391.272320][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 391.280277][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 391.288238][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 391.296785][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 391.305028][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 391.313365][ T8166] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 391.327990][ T8166] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 20:07:12 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x6611, 0x0) 20:07:12 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 20:07:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:07:12 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) getuid() r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:12 executing program 0: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = dup(r0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r1, 0x330f, 0x0) 20:07:12 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x12aa9dc, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000005c0)='bpf\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x840c20, &(0x7f0000000180)) 20:07:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r2) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000040)={0x0, 0x0}) 20:07:12 executing program 4: r0 = memfd_create(&(0x7f0000000080)='.\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) [ 391.772813][ T30] audit: type=1400 audit(1686427632.356:240): avc: denied { audit_write } for pid=8169 comm="syz-executor.0" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 391.799882][ T8175] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. 20:07:12 executing program 3: setrlimit(0x7, &(0x7f0000000080)) syz_open_dev$hiddev(&(0x7f0000000040), 0x0, 0x0) 20:07:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000900)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) mount$binder(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, &(0x7f0000000100)) 20:07:12 executing program 4: r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) getpeername$unix(r0, 0x0, &(0x7f0000000100)) [ 391.836325][ T30] audit: type=1400 audit(1686427632.416:241): avc: denied { mount } for pid=8177 comm="syz-executor.3" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 20:07:12 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) getuid() r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:12 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000001c0)={{}, {0x0, 0x989680}}, 0x0) read$char_usb(r0, &(0x7f00000000c0)=""/154, 0x9a) 20:07:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) [ 391.870492][ T30] audit: type=1400 audit(1686427632.416:242): avc: denied { remount } for pid=8177 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 391.914687][ T8196] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 391.920354][ T30] audit: type=1400 audit(1686427632.416:243): avc: denied { unmount } for pid=460 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 391.952310][ T30] audit: type=1400 audit(1686427632.466:244): avc: denied { mounton } for pid=8187 comm="syz-executor.1" path="/root/syzkaller-testdir1281524578/syzkaller.KhHS0O/568/file0" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=dir permissive=1 [ 392.025598][ T8200] loop5: detected capacity change from 0 to 2048 [ 392.152183][ T8200] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.159078][ T8200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.184134][ T8200] device veth0_vlan left promiscuous mode [ 392.190088][ T8200] device veth0_vlan entered promiscuous mode [ 392.199737][ T8200] device veth1_macvtap left promiscuous mode [ 392.206800][ T8200] device veth1_macvtap entered promiscuous mode [ 392.213675][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 392.221194][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 392.228532][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 392.236742][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 392.244825][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 392.252907][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 392.260867][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 392.268855][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 392.276755][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 392.285080][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 392.293292][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 392.301136][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 392.309093][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 392.317192][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 392.325114][ T4698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 392.333259][ T8201] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 392.348478][ T8201] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000040)=0x80) dup2(r1, r2) setrlimit(0x7, &(0x7f0000000000)) accept$inet(r2, 0x0, 0x0) 20:07:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0xd, &(0x7f0000001340)=@ccm_128={{}, "afa5c76b5641ff97", "e243e5b9b4056667d7855162ca2c9984", "9b32e985", "d274eb40f0096445"}, 0x28) 20:07:13 executing program 1: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) ioctl$FS_IOC_GETFSLABEL(r0, 0xc020660b, 0x0) 20:07:13 executing program 0: prctl$PR_GET_SPECULATION_CTRL(0x1d, 0x0, 0x0) 20:07:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r4], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r7, r7, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 20:07:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'TPROXY\x00'}, &(0x7f0000000100)=0x1e) 20:07:13 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@private2, @dev={0xfe, 0x80, '\x00', 0x2f}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = dup2(r1, r1) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r2, 0x29, 0x3b, &(0x7f0000000040)={0x21, 0x8, '\x00', [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @ra={0x5, 0x2, 0x4}, @ra={0x5, 0x2, 0x9}, @enc_lim={0x4, 0x1, 0x9}, @calipso={0x7, 0x20, {0x0, 0x6, 0xc8, 0x150b, [0x9, 0xbb, 0x8]}}, @enc_lim]}, 0x50) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'ip6gretap0\x00', {}, 0x8}) 20:07:13 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = dup(r0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, 0x0) 20:07:13 executing program 0: r0 = eventfd(0x0) fchown(r0, 0x0, 0xffffffffffffffff) 20:07:13 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) fgetxattr(r0, &(0x7f0000000100)=@known='system.sockprotoname\x00', 0x0, 0x0) 20:07:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000002500)={0x0, 0x0, &(0x7f00000024c0)={&(0x7f0000000040)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_PROBE_RESP={0x23d, 0x91, "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"}, @NL80211_ATTR_BEACON_TAIL={0x4}, @NL80211_ATTR_IE_PROBE_RESP={0x43, 0x7f, [@mic={0x8c, 0x10, {0x0, "abe45e660962", @short="91c0c22c87163282"}}, @preq={0x82, 0x2b, @ext={{}, 0x0, 0x0, 0x0, @device_a, 0x0, @device_b, 0x0, 0x0, 0x1, [{}]}}]}, @NL80211_ATTR_FTM_RESPONDER={0x1c14, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_CIVICLOC={0x1001, 0x3, "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"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0xc05, 0x3, "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"}]}]}, 0x33fe0}}, 0x0) 20:07:13 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) 20:07:13 executing program 3: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x101143, 0x0) r2 = dup3(r0, r1, 0x0) openat$incfs(r2, &(0x7f0000000040)='.pending_reads\x00', 0x0, 0x0) 20:07:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) setsockopt$MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 20:07:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETCARRIER(r0, 0x40049409, 0x0) [ 392.800477][ T8213] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 392.933231][ T8237] loop5: detected capacity change from 0 to 2048 [ 392.972601][ T8237] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.979497][ T8237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.012114][ T8237] device veth0_vlan left promiscuous mode [ 393.018927][ T8237] device veth0_vlan entered promiscuous mode [ 393.029897][ T8237] device veth1_macvtap left promiscuous mode [ 393.039351][ T8237] device veth1_macvtap entered promiscuous mode [ 393.049060][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 393.056576][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 393.063934][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 393.072239][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 393.080574][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 393.088668][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 393.096999][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 393.105105][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 393.113216][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 393.121518][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 393.129829][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 393.137887][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 393.145958][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 393.154233][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 393.162506][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 393.172297][ T8238] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 393.189977][ T8238] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r3 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r3, @ANYRESDEC, @ANYRESHEX=r3], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r6, r6, 0xffffffffffffffff, r6, 0xffffffffffffffff]}, 0x80) 20:07:14 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8ff0000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") 20:07:14 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = pidfd_open(r0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = pidfd_getfd(r1, r2, 0x0) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 20:07:14 executing program 3: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = pidfd_getfd(r1, r2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000), 0x4) 20:07:14 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:14 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000002ac0), 0x1, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) 20:07:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x4b45, 0x0) 20:07:14 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = pidfd_open(r0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = pidfd_getfd(r1, r2, 0x0) sendmsg$NL80211_CMD_TESTMODE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 20:07:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x390) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x2, @remote}, 0x20) accept$inet(r0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000340)={'filter\x00', 0x0, 0x3, 0xea, [0x0, 0xabe, 0x3, 0x7ff, 0xe912, 0x5], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000000240)=""/234}, &(0x7f00000003c0)=0x78) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) pipe2$watch_queue(0x0, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='net_prio.prioidx\x00', 0x275a, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e22, @private=0xa010100}}, 0x0, 0x0, 0x0, 0x0, "43d011e5f915402f515c26dff68feb74e00d438a276d78e5d036a3ef33456864517de39691efd536ec2e474d3d3bd3441a2cd3dc5972be69dc34f1f818a8d9d8b7f00a17004b5ee68d702b8e5c977bff"}, 0xd8) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, 0x0, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0x5450, 0x0) 20:07:14 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) dup2(r1, r0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0'}, 0xb) 20:07:14 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x62442, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f00000000c0)) 20:07:14 executing program 3: r0 = openat$zero(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) read(r0, 0x0, 0x0) [ 393.719075][ T8247] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 393.723013][ T8249] loop4: detected capacity change from 0 to 2048 [ 393.747587][ T8249] FAT-fs (loop4): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 393.760649][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Dropping request. Check SNMP counters. [ 393.838420][ T8266] loop5: detected capacity change from 0 to 2048 [ 393.928069][ T8266] device veth0_vlan left promiscuous mode [ 393.934401][ T8266] device veth0_vlan entered promiscuous mode [ 393.944688][ T8266] device veth1_macvtap left promiscuous mode [ 393.954510][ T8266] device veth1_macvtap entered promiscuous mode [ 393.964038][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 393.971535][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 393.982532][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 393.990851][ T459] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.997926][ T459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.005438][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 394.013697][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 394.022030][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 394.030576][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 394.038910][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 394.047121][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 394.055091][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 394.063340][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 394.071449][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 394.079633][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 394.088010][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 394.096144][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 394.104483][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 394.113167][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 394.121518][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 394.129903][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 394.137811][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 394.145633][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 394.153583][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 394.161585][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 394.169795][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 394.178009][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 394.185715][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 394.193594][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 394.200976][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 394.208460][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 394.216766][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 394.224754][ T459] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 394.232280][ T8268] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 394.246329][ T8268] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:15 executing program 3: pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) close(r0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 20:07:15 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:15 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0x80108907, 0x0) 20:07:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r3 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r3, @ANYRESDEC, @ANYRESHEX=r3], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="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"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r6, r6, 0xffffffffffffffff, r6, 0xffffffffffffffff]}, 0x80) 20:07:15 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_group_source_req(r0, 0x0, 0x3, 0x0, 0x0) 20:07:15 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f00000008c0)={0x420}, 0x420}}, 0x0) 20:07:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @local}, {}, 0x2a, {0x2, 0x0, @empty}, 'netdevsim0\x00'}) 20:07:15 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = dup(r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 20:07:15 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_PMK(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) dup2(r1, r0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 20:07:15 executing program 0: setreuid(0xee00, 0xee00) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000001800)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 20:07:15 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) fcntl$notify(r0, 0x402, 0x0) 20:07:15 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) 20:07:15 executing program 3: pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) close(r0) r1 = fsopen(&(0x7f0000000000)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) [ 394.584763][ T30] audit: type=1400 audit(1686427635.166:245): avc: denied { write } for pid=8283 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 394.623771][ T8277] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. 20:07:15 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:15 executing program 0: r0 = socket(0x1d, 0x2, 0x6) tee(0xffffffffffffffff, r0, 0x0, 0x0) [ 394.709795][ T8298] loop5: detected capacity change from 0 to 2048 [ 394.735206][ T8302] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 394.818620][ T8298] device veth0_vlan left promiscuous mode [ 394.825125][ T8298] device veth0_vlan entered promiscuous mode [ 394.836266][ T8298] device veth1_macvtap left promiscuous mode [ 394.845203][ T8298] device veth1_macvtap entered promiscuous mode [ 394.854581][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 394.861952][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 394.869515][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 394.877998][ T2405] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.884944][ T2405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.892492][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 394.900952][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 394.910012][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 394.918574][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 394.926883][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 394.935329][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 394.943801][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 394.952020][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 394.960379][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 394.968479][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 394.976364][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 394.984544][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 394.993985][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 395.002306][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 395.010449][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 395.018627][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 395.026720][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 395.034840][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 395.042904][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 395.050706][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 395.060291][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 395.068369][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 395.076037][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 395.083820][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 395.091067][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 395.098471][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 395.106341][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 395.114585][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 395.122093][ T8303] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 395.136791][ T8303] bridge0: port 1(bridge_slave_0) entered disabled state 20:07:16 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000340)=@file={0x1, './file0/file0\x00'}, 0x6e) 20:07:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x8918, 0x0) 20:07:16 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 20:07:16 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6}]}, 0x8) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'erspan0\x00', {}, 0x5}) 20:07:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(&(0x7f0000000840)={0x42080, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000b00)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x20, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r2}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) stat(0x0, 0x0) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/89, 0x59}, {&(0x7f0000000440)=""/51, 0x33}, {0x0}, {0x0}], 0x4}, 0x40000140) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r3 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r3, @ANYRESDEC, @ANYRESHEX=r3], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d00590c95"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a80)={&(0x7f00000016c0)=ANY=[@ANYBLOB="ef60efda280035", @ANYRES16=0x0, @ANYBLOB="20002bbd7000fddbdf250f0000004001018008000300030000000d0001007564703a73797a3000000000380004001400010002004e247f0000010000000000000000200002000a004e230000000420010000000000000000000000000000db602775080003002c0800005400028008000400090000000801040001000000080001000f0000000800030000080000080004000100000008000300ffff000008000300930000000800020097000000080003001909000008000400001000002c0004001400010002004e237f00000100000000000000001400020002004e23e00000020000000000000000080003000200000000000009ff010000000000000000000000000001090000001400020002a53d20ac1414aa000000000000000024000280080002000000008008000400feffffff080001000400000008000400ff0f00002400038008000300000001000800010006000000080002000300000008000200050000001400078008000200000000800800020074ba0000240003800800030006000000080001000900000008000200ffffffff08000109e70000004400098008000100c99200000800020001010000080001000600000008000100f000000008000200040000000800010001800000080002000100000008000100fffbffff240007800c000300010001000000000008000100000000000c00040002000000000000000c000380080002005acd00"/542], 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040885) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r5, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x11, 0x9, &(0x7f0000000dc0)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @alu={0x4, 0x1, 0xc, 0x8, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff0}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}], &(0x7f0000000e40)='syzkaller\x00', 0xff, 0x1b, &(0x7f0000000e80)=""/27, 0x41100, 0x5, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000f80)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000001500)={0x5, 0x6, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001600)=[0xffffffffffffffff, r6, r6, 0xffffffffffffffff, r6, 0xffffffffffffffff]}, 0x80) 20:07:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone3(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@RTM_GETNSID={0x3c, 0x5a, 0x0, 0x70bd29, 0x0, {}, [@NETNSA_NSID={0x8}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_NSID={0x8}]}, 0x3c}}, 0x4) getresgid(0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x40000140) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801008b0400001fb0bc4680da51d100850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) 20:07:16 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=0x7fff, 0x12) 20:07:16 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, &(0x7f0000002d40)) 20:07:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) syz_fuse_handle_req(r0, &(0x7f0000004180)="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", 0x2000, &(0x7f0000000f40)={&(0x7f0000000100)={0x50}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$cgroup(0x0, &(0x7f0000000040)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000200)={0xa0, 0x0, r1}, 0xa0) 20:07:16 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_DISASSOCIATE_REQ(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xf}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) 20:07:16 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000001c00), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14, 0x18, {0x0, @bearer=@l2={'ib', 0x3a, 'pim6reg\x00'}}}}}, 0x30}}, 0x8050) 20:07:16 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) [ 395.459660][ T30] audit: type=1400 audit(1686427636.046:246): avc: denied { getopt } for pid=8316 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 20:07:16 executing program 0: r0 = socket(0x0, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) timer_create(0x0, &(0x7f0000000180)={0x0, 0x17, 0x4}, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipv6_route\x00') setresuid(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) syz_clone3(&(0x7f0000000780)={0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) stat(0x0, &(0x7f0000000840)) getpgid(0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendmmsg$unix(r2, 0x0, 0x0, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) 20:07:16 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sched_rr_get_interval(r0, &(0x7f0000000240)) 20:07:16 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000380), 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x40044581, 0x0) [ 395.501291][ T8307] A link change request failed with some changes committed already. Interface vlan2 may have been left with an inconsistent configuration, please check. [ 395.529504][ T8321] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN [ 395.541144][ T8321] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] 20:07:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) tee(r0, 0xffffffffffffffff, 0x0, 0x0) [ 395.549448][ T8321] CPU: 0 PID: 8321 Comm: syz-executor.3 Not tainted 5.15.106-syzkaller-00249-g19c0ed55a470 #0 [ 395.559455][ T8321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 395.569350][ T8321] RIP: 0010:step_into+0x1b6/0xe70 [ 395.574315][ T8321] Code: 20 0f 85 99 0a 00 00 44 8b 3b 43 80 3c 2c 00 74 0a 48 8b 7c 24 18 e8 e9 d0 f3 ff 48 8b 9c 24 b8 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 86 0a 00 00 8b 1b 89 de 81 e6 00 00 07 [ 395.594140][ T8321] RSP: 0018:ffffc90000a877e0 EFLAGS: 00010202 [ 395.600040][ T8321] RAX: 0000000000000002 RBX: 0000000000000010 RCX: 0000000000040000 [ 395.607852][ T8321] RDX: ffffc90004b08000 RSI: 000000000000016e RDI: 000000000000016f [ 395.615664][ T8321] RBP: ffffc90000a87910 R08: ffffffff81bd6190 R09: ffffed10237da345 [ 395.623733][ T8321] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92000150f13 [ 395.632239][ T8321] R13: dffffc0000000000 R14: ffffc90000a87c40 R15: 0000000000000011 [ 395.640710][ T8321] FS: 00007f8d7d9ba700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 395.649477][ T8321] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 395.655896][ T8321] CR2: 00007fa89e7acf84 CR3: 000000012a6b2000 CR4: 00000000003506b0 [ 395.663712][ T8321] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 395.671520][ T8321] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 395.679520][ T8321] Call Trace: [ 395.682751][ T8321] [ 395.685524][ T8321] ? set_root+0x400/0x400 [ 395.689694][ T8321] ? up_read+0x5a/0x180 [ 395.693686][ T8321] walk_component+0x359/0x610 [ 395.698194][ T8321] ? nd_alloc_stack+0xf0/0xf0 [ 395.702711][ T8321] ? security_inode_permission+0xb0/0xf0 [ 395.708181][ T8321] ? fuse_do_getattr+0x7e0/0x7e0 [ 395.712949][ T8321] link_path_walk+0x642/0xd90 [ 395.717463][ T8321] ? handle_lookup_down+0x130/0x130 [ 395.724237][ T8321] path_lookupat+0xa0/0x450 [ 395.728920][ T8321] filename_lookup+0x230/0x5c0 [ 395.733953][ T8321] ? hashlen_string+0x120/0x120 [ 395.739863][ T8321] ? getname_flags+0x1fd/0x520 [ 395.744456][ T8321] user_path_at_empty+0x43/0x1a0 [ 395.749236][ T8321] __se_sys_mount+0x285/0x3b0 [ 395.753744][ T8321] ? switch_fpu_return+0x1ed/0x3d0 [ 395.758700][ T8321] ? __x64_sys_mount+0xd0/0xd0 [ 395.763289][ T8321] ? __kasan_check_read+0x11/0x20 [ 395.768147][ T8321] __x64_sys_mount+0xbf/0xd0 [ 395.772578][ T8321] do_syscall_64+0x3d/0xb0 [ 395.776828][ T8321] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 395.782555][ T8321] RIP: 0033:0x7f8d7ec47169 [ 395.786810][ T8321] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 395.806772][ T8321] RSP: 002b:00007f8d7d9ba168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 395.815188][ T8321] RAX: ffffffffffffffda RBX: 00007f8d7ed66f80 RCX: 00007f8d7ec47169 [ 395.822998][ T8321] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 395.831521][ T8321] RBP: 00007f8d7eca2ca1 R08: 0000000000000000 R09: 0000000000000000 [ 395.840121][ T8321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 395.848139][ T8321] R13: 00007ffc1111c71f R14: 00007f8d7d9ba300 R15: 0000000000022000 [ 395.855996][ T8321] [ 395.858854][ T8321] Modules linked in: [ 395.863976][ T8321] ---[ end trace e16d08f3c76e6c71 ]--- [ 395.871588][ T8321] RIP: 0010:step_into+0x1b6/0xe70 [ 395.876643][ T8321] Code: 20 0f 85 99 0a 00 00 44 8b 3b 43 80 3c 2c 00 74 0a 48 8b 7c 24 18 e8 e9 d0 f3 ff 48 8b 9c 24 b8 00 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 86 0a 00 00 8b 1b 89 de 81 e6 00 00 07 [ 395.896194][ T8321] RSP: 0018:ffffc90000a877e0 EFLAGS: 00010202 [ 395.902230][ T8321] RAX: 0000000000000002 RBX: 0000000000000010 RCX: 0000000000040000 [ 395.910095][ T8321] RDX: ffffc90004b08000 RSI: 000000000000016e RDI: 000000000000016f [ 395.918344][ T8321] RBP: ffffc90000a87910 R08: ffffffff81bd6190 R09: ffffed10237da345 [ 395.926183][ T8321] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92000150f13 [ 395.934035][ T8321] R13: dffffc0000000000 R14: ffffc90000a87c40 R15: 0000000000000011 [ 395.943979][ T8321] FS: 00007f8d7d9ba700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 395.952907][ T8321] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 395.959444][ T8321] CR2: 00007fcfece8b988 CR3: 000000012a6b2000 CR4: 00000000003506b0 [ 395.967521][ T8321] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 395.975329][ T8321] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 395.983245][ T8321] Kernel panic - not syncing: Fatal exception [ 395.989212][ T8321] Kernel Offset: disabled [ 395.993430][ T8321] Rebooting in 86400 seconds..