ee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:18 executing program 0: r0 = syz_clone(0x61084800, &(0x7f00000000c0)="e0959acaf454e0e44afb4fff5346706e6eff11803d344a5213668ba13022aa6a73a3c112d3875911b89a2e6b73a1ce54722fada1760008ce52829b8504a7d14c15bcadb745ef657a6e45d895a7137595655b892064eb865969581087b4d96bf183a1ff3e87faf653d5a7c2d446e5261f8d1535a2ecbfd4e4831d992396b54ce09dccd1eb5d8ce98a3ccbee81cf40b598ff4fb4c39e4eeef19fcc21fba10a4127c9cc7783fa2ea1eaa834528345f8ed7785445c1d5c96f91d2d6cc06a212445d7bbc2f7b118ca4d11e940eca3c5767b7396b586c27b5c842f131aa1c7120c900bb0ad8ca8970106ee489baf6d6d9bf3ca7e09159c749e34ffa187b8650ac591fa67471b6976af090627e8967bb27e1cecf1a1d8b37c95a63b01add6249102c5e987a8e2dc90f6c630213fc18979af9d14ace55ba2dfce51349aa03480fd5ef64fb48f639c13ea6444556ca98cdfdebc30f2c9f13497b1b8aa627b79c8033fc5cc10e0af7d5008f503d64006434ad8369e02c75f680327064be9ba3517b97894106e8d8686b1b4fc48d0f3b10beb184b7ea387b409f5a1ae502773bc0092f2ec553451fa3fab929df14d50241dd89c96357be3715409c402b32ea8cbe97bf1528f25a9bae58d8b8b46cd637707ab5ebd05f4c229bf84daf24456f81bcedd122fc9e3b63d855cd5c365c6894721b10df8a23eb31461ef3665173e7c51baaf809d32145e749096d2f9093183036016ab55910ee7fa83b5a5abcf849eee632d9dd484255c25f4303e4c84d50eb5554035c5d1336ad804a7695fae96a885c9a87493171d228df28faacd526c7069abe9caf261ad1d94aad48bd71ac14f716616b3809cc58c94e689789603a5b27acd0e74ad34cc2260ecb29a5b086a62e13765f442aa41c4d932f05c39bee61725a9b888cd06401c2ffc86ba824fca6c78b6b3bc64613b513ff9f85b1b1c96ff086413088752b0bd725e2a31ec06495dd7d9f7438e19d77a22f84fff17d85af17c11cea211dfa45b4ba7a5616f0f6467870dbcf83f5ad2c6ae864b6e642e10457aeb0f92aa2e18987adbd34ac76332e784e82cf235c16fb6370f9090210d4c91ff96b29cf82277707cd02690f02775f1ee24845c8211540699134d03b694107041b4daa9116b39ac1fa051b46d609e76d6c862d140767ec0137006ad58a84a4515f2659c3e122032bf0290c4a96ed925d673707bc55aa9c8870b59de92fe0258ca23e532a0713e9d40107b2fb397b17cd70ccfd35d35dcaefff1e379cb7d482beb5be60209ef8f9d66b8014291d45e1b982208aed78296a3b842e6ebfed8bc74f857956fec572b2c86d7abb1057e970fc70ca3d8d49832603bc2672035c24750a021b12de290e136e22520554b01929008368a63b37f6d2be2fc5ba1a94002167372250876e2e186cfa428fabf8ba2cc450dddfbe8df7f12d7256e713b14b357055c85c328b0a4e10b41d4924350b5177a7b88042b1dcb3156095cb2d6be8bedf89983426177d47dc51eed40480d8d2b3e1fc60972f42277327c76151a34e9e59887d65a737f2a932202a76cc596249b00c47302ce537094c256d48acddaf2dc86ed1ec60dd442a34b3db005ad169cf1bbf8c1bab6c5ce6392704fc8b489a666d2174295a5919fb5b3a65b42276125cdf493cf791a26111d8ff663ce94fe45c8c681edfa10859f2b4d8dcebe05c0272ddb0f0b150cb1e4bf120f4f41b5ab3112dcd680500da1ba934cee5dc3289f2429870616f4d82455bb69d3825a143119b739c1be5869f39b9c2768b6def174ad7acc262e8a6ab2332080c8ff4416558baa305815644e999df17102575a7884728a30fca014ddff2ac6da5a40ec6a9e423229491d99e4d07916d8fb6bcbc13a2612fab592c29c333e8304118d516f585207164db271378a8d9c5305c63d784d1c6ecec47a0b1be23661a2b293c87911272332b2616b2445c3ec65e9e6c5b243cbe0010b49a1d761dadcb799406799be86dea595a1d225f071ed04e325bc2953007c2f35e8830c2351b226ba54b3eb72a63bc05a300e8b3a58d01f20ba0c3d6d241b3c37fcb355b94d2736a76b60bc0818f251c042ab864a4f24d08e3f03d96628081facaadd85e94fb9842f68284071cb0f846d091fe367c1bc746a15132f724cb1da416f96da009754de0e53b5b6aee8a5d261961ae296deb9f72b7a05c2ae6553b6d431eafc80f9d9b4d9228d1dbfd413ace22a83a5be360decfaaf8bedfd2e4b68b4acd11952fb5b13349d150cc350998420bd09a57eba0d272c0b4cdd11259714f3499a50b79d64c1c17701522ba421cb5388a2bbc0c441a27645d7182f29a29ebab78c88ef771af6c19bbd833e30c47a844dab19acdfa0faa4da897527e9c4fd6c9e14c74768a3697af840f112399803058f5c0336b674b5cd261a4a0f0da600335cfe61fcce1b26f3ab88e62f4aaa085afd0a87985d9964e7ac197659f9d3ea127af87054aee2942057f38c7fcdfa1f62424f6e259f0360e0729089663fc0a354e72346f58551b2d739a912743b1332c83c801b7a2be5e1adcc5975dedcc3b5dd76a2ccc655f1c9476d2fb0f4c1422a37243e8bb71446c7119c4b2d41e85c19c3d702a7fa7a9fe06e55c3bd06b5670c270d16c5b4ee23c4ca128e89b93e1dc0b3ab28bbd89f3ad6277022a269bc56f02a589734eda90f67191cef86c5b6d51e6b6865a1e6869e9be363b0755a6253ebbc549c5d02065015618c5df7aa512a7a0c47eade572fe3b187f64ae1c82e0012afddd69e54e3bba930b8718d0d81075d7d10ab3f399759274895a02c72333f59629e804425e933050db95ecbb2104bb552fcd56b62741432a54f46d7fc379f688ce5a0e9e242b2c5b9dd80468cfcfc2f08e54e72c0d8c5bdb5945d022fa2001ad362735d9fc6a4726de37617368f774a2f7b913a69a1618d4d0d89618ed02d84f788fded1bea2680084a4695d8fce1efd414aa28db7198762f3addbcf8516dca23e2bb6a69b6ee09f68284360ab88fa87cbee8165d08cd32177fc93d725f117e56ce8dbe9a929766502c33d108bd732a211455182dc75de989a63aaf5bd863b748ee0d24d7f372994b6f50ada3a5cb07988e6eee595d1984b27798204843d64b3816ec6999655710bdd4d45b065f43f45b4a2e8d3cb9a57c21310b9d312f4c5be520cc6b037b3ad06d1faecf5514d1fa11ee2770bc3fdff4a0ca3c9cfc778ad003fd15814b026fb90c2ec46dc1c1350b07a0ace75186ac2cbef9ce937f240001bf64e98429358e92e4cfde6d0fd6a33476d2c46f2cbaec981df5caa661e098d2473a022a97020649396684e25b61bb40fff0f9529bfe7e46d7fbd6c662d31c44322483d0c7dfd179e8c0c344fcb8f5c1b14729b0efba68c6429f94f9711deb58e5fcda624142ea7aff71f5a8193614eef5f99a53148c5bded47fdd27924be7aa4f5fa00d2c748e6f86d4d37b97b8f2268f4b96079e76d4e1ee0f2c57630bb2f214ae5322dd7d21e3974100525f660489f660d1c508d43b7e81df773d185d506e4df27e1b364c20bf9910b8d053064db8c34ac1b2f2a1161e331d950932a8ff8e4fae4c2a760c544181fdc2e6ed27f19717eddc6db12fb4f6b0560f8c9cc2d3e5e9dd3f01cb0c2fdce43087dc1487827e126ba3221c825cd62884fb50a04f3005d3f717e9585fbffa517bc17cb7ac96eace1da5649eac34ab98803e811afbca47259fd9db944dc43823584262c35e032529819744a98c9c870d46c2f3e6fcd3c92425a4c876932cd6a9b9b6ca89e9671bd376364304a3d0388888d3837946ba0b77f3e6b63d3a0c64291b14b624743abbbffa877c7ec5eabea96391cccd048216094ab5ffbd8d80ca637345370ff3b32eb1fcc5b02baaaf3963617e72b170e55b57831e6c58a03a8babb5b17ffa8c877183a20aace29435a965d3bf14a8b6be96a7d06e99a5653a628d83cb38affdb0971cbd9ca6878f9107b81a1e0b2ac37229ad035675d2083f71cb84b216ece0b62f30176a7cba7189500eefcdb80b61e2689eded7a79d5752c9f6d6545164724a41f4fa67d328385460c48d18bef4427c99e7e49ef1670d6541da5ced00425007d1e8d2872b6141798232f2ebc187c360c3891206c079371e8056ecb3d2ca8930499ce894d182632b4acc746018ab21bbaf55d6a1ce460bed0a9f0d6b2fe43486b9fb704581b4bc81e45fffe1778a40b86de043ca4f5b503ed27e6da78d84c3c6345d32fba5ba2653c26af86cb754fa4b982b8b5f06f31625aeab580997a9c5", 0xbd9, 0x0, &(0x7f0000001100), &(0x7f0000001140)="ecd6a4484d40891756a452d43f8a4cb7ffd0a91bfe0aef988f57a1400ad3d0ec2d4f7ef418a2a7974855") syz_clone(0x40800400, &(0x7f00000011c0)="aef8b6708f3f415260c367765ec9e4b6f3ed5f398d3652721dd757ba996dcdeb2761b7fb433e817bf7eeda2b21ef5a23df777b2b77f63a997544c7764c27b40b1b5b7fd6b7457295bfb426", 0x4b, &(0x7f0000001240), &(0x7f0000001280), &(0x7f00000012c0)="74c2cf7a7217f48f2935ebb6f1b32797958766049b47ebe1665b04cf827404ab8bcadb541086832cff4c5cb6c31dada68eeede10cc15a0e664016cbad7138117ebcf17605f929180a232cbd24a") perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbb, 0x2, 0x7d, 0x4, 0x0, 0x7, 0x85149, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x2040, 0x2, 0x200, 0x3, 0x0, 0x80000001, 0x7fff, 0x0, 0x4, 0x0, 0x2}, r0, 0x4, 0xffffffffffffffff, 0x2) 07:45:18 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xf30a}, 0x0) 07:45:18 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001140)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 07:45:18 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x8100) 07:45:18 executing program 5: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x1, 0x0, 0x0, 0x6, 0x0, 0x900000, 0x90000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x2, @perf_config_ext={0x6, 0x81}, 0x2004, 0x0, 0x74, 0x9, 0x0, 0x778, 0x0, 0x0, 0x101, 0x0, 0x7ff}, r0, 0xd, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="18020000000000800000000000000000850000004100000095000000000000004be98911ed523cf4451d51e400cbd30efbb0a73ceb2b050a456c3a6cfd127868ad3fe3f9a9b946c97f9fc091e4c3f4b0a0d7ed298717a480c48868162ff933958cb6a5265519fee4cb1b8b93f0b164770fd40c7a8060ce72beff7cda177e281cf0b7a1a97b2c8c5617bff8c9441a45fd951df19a9c6e933500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xfffff000, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 07:45:18 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x34000}, 0x0) 07:45:18 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x400300}, 0x0) [ 2873.112834][ T6910] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x226]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:18 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x1000000}, 0x0) 07:45:18 executing program 5: r0 = syz_clone(0x61084800, &(0x7f00000000c0), 0x0, &(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)="ecd6a4484d40891756a452d43f8a4cb7ffd0a91bfe0aef988f57a1400ad3d0ec2d4f7ef418a2a79748552cc2b97d6c84bec403a86ddf8498e1cae38fdcdb11845cab08d4156c6f6782514e11f554a65fb45bbbc9cca356") syz_clone(0x40800400, &(0x7f00000011c0)="aef8b6708f3f415260c367765ec9e4b6f3ed5f398d3652721dd757ba996dcdeb2761b7fb433e817bf7eeda2b21ef5a23df777b2b77f63a997544c7764c27b40b1b5b7fd6b7457295bfb426", 0x4b, &(0x7f0000001240), &(0x7f0000001280), &(0x7f00000012c0)="74c2cf7a7217f48f2935ebb6f1b32797958766049b47ebe1665b04cf827404ab8bcadb541086832cff4c5cb6c31dada68eeede10cc15a0e664016cbad7138117ebcf17605f929180a232cbd24a") perf_event_open(0x0, r0, 0x4, 0xffffffffffffffff, 0x2) 07:45:18 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x8847) [ 2873.153829][ T6910] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2873.174136][ T6920] xt_ct_set_helper: 2 callbacks suppressed [ 2873.174153][ T6920] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2873.340847][ T6933] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:19 executing program 0: socketpair(0x29, 0x5, 0x100000, &(0x7f0000000000)) 07:45:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x2000000}, 0x0) 07:45:19 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x8848) 07:45:19 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0xbc030000, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:19 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000001600)='ns/pid\x00') 07:45:19 executing program 5: r0 = syz_clone(0x61084800, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000001100), 0x0) syz_clone(0x40800400, &(0x7f00000011c0)="aef8b6708f3f415260c367765ec9e4b6f3ed5f398d3652721dd757ba996dcdeb2761b7fb433e817bf7eeda2b21ef5a23df777b2b77f63a997544c7764c27b40b1b5b", 0x42, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x2, 0x7d, 0x0, 0x0, 0x7, 0x85149, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x2040, 0x2, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0x4, 0xffffffffffffffff, 0x0) 07:45:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x3000000}, 0x0) 07:45:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x18}, 0x48) [ 2873.972626][ T6939] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2874.005444][ T6939] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, 0x0, 0x32}, 0x20) 07:45:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x22d]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x4000000}, 0x0) 07:45:19 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x919c) [ 2874.076382][ T6951] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2874.104977][ T6955] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2874.137959][ T6955] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2874.221596][ T6961] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:20 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0xc2020000, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:20 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) getpid() perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="18020000000000800000000000000000850000004100000095000000000000004be98911ed523cf4451d51e400cbd30efbb0a73ceb2b050a456c3a6cfd127868ad3fe3f9a9b946c97f9fc091e4c3f4b0a0d7ed298717a480c48868162ff933958cb6a5265519fee4cb1b8b93f0b164770fd40c7a8060ce72beff7cda177e281cf0b7a1a97b2c8c5617bff8c9441a45fd951df19a9c6e933500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xfffff000, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 07:45:20 executing program 5: socket$kcm(0x29, 0x0, 0x0) syz_clone(0x40000080, 0x0, 0x0, &(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000000000)) 07:45:20 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x919f) 07:45:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x5000000}, 0x0) 07:45:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x6000000}, 0x0) 07:45:20 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x91bb) 07:45:20 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={@cgroup, 0xffffffffffffffff, 0x11}, 0x10) 07:45:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x7000000}, 0x0) 07:45:20 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x91bc) 07:45:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x260]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:20 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2a2400, 0x0) [ 2874.928603][ T6978] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2874.977372][ T6982] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2875.007186][ T6982] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2875.075246][ T6989] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:21 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0xc8020000, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x8000000}, 0x0) 07:45:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x1, 0x0, 0xd66}, 0x3f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) sendmsg$inet(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000240)={0xf, 0x80, 0x3f, 0x8, 0x1, 0x76, 0x0, 0x0, 0x800a, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x9}, 0x100, 0x0, 0x1, 0x5, 0x4, 0x0, 0x1, 0x0, 0x9c, 0x0, 0x480000000000000}, 0xffffffffffffffff, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000540)='^\x00') perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0xf5c8, 0x6, 0x0, 0x3, 0x0, 0xffffffd}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r4 = syz_clone(0x20104100, 0x0, 0x0, 0x0, &(0x7f0000001340), &(0x7f0000001440)) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x0, 0x38, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000680), 0x3}, 0x0, 0x2, 0x3, 0x2, 0x7fffffff, 0x9, 0x5, 0x0, 0x546d, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x40, 0x7, 0x4, 0x0, 0x0, 0x3a, 0x100, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f00000000c0), 0x1}, 0x10000, 0x3, 0x1, 0x0, 0x0, 0x5, 0xfffb, 0x0, 0x6}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x9, 0x1f, 0x4, 0x83, 0x0, 0x9, 0x40, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x8000000000000001, 0xf2, 0x1, 0xfffffffffffdfffd, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 07:45:21 executing program 0: syz_clone(0x44801600, &(0x7f0000000000), 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="00428ff4b97eb7eebe36f3e0df5716510e0e2856e0849f9bd2f33382c4dd96d9e1cee5c644526033e987a599cb040fa7605011788a054552115728a65570e0d0ff3b0726f68b927d148ac53daf4c4aa1c1f79f80063d331fbc56913a7065a042b699032f88222f4a45f8220d2f9d9682a595fc901e7c34") 07:45:21 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x91bd) 07:45:21 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x9c91) 07:45:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x9000000}, 0x0) 07:45:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xa000000}, 0x0) 07:45:21 executing program 0: socketpair(0x2b, 0x1, 0x44, &(0x7f0000000000)) 07:45:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x270]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:21 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x9f91) 07:45:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xb000000}, 0x0) [ 2875.794657][ T7007] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2875.941756][ T7019] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:22 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0xc8030000, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:22 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xbb91) 07:45:22 executing program 0: socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) syz_clone(0x40000080, &(0x7f00000028c0), 0x0, &(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000000000)="ff9df12303021f6a17c91088748549f9763c33ec6ce78b189a0992ffc6b85c") 07:45:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xc000000}, 0x0) 07:45:22 executing program 5: bpf$BPF_PROG_QUERY(0x23, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) 07:45:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xd000000}, 0x0) 07:45:22 executing program 5: socket$kcm(0x29, 0x2, 0x0) syz_clone(0x40000080, 0x0, 0x0, &(0x7f00000029c0), 0x0, 0x0) 07:45:22 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xbc91) 07:45:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xe000000}, 0x0) 07:45:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x286]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:22 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xbd91) [ 2876.667798][ T7036] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xf000000}, 0x0) [ 2876.811977][ T7046] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:23 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x0, 0x0, 0x9}, 0x48) 07:45:23 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xf30a) 07:45:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x2e, 0x0, 0x0, 0x0}, 0x20) 07:45:23 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0xca010000, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x10000000}, 0x0) 07:45:23 executing program 0: socketpair(0x15, 0x5, 0x5, &(0x7f0000000000)) 07:45:23 executing program 5: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x6, 0x4, 0x3f, 0x0, 0x0, 0x0, 0xc084, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x5}, 0x8021, 0x0, 0x1, 0x3, 0x10001, 0x3bd7, 0x8}, 0xffffffffffffffff, 0x9, r0, 0x8) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) getpid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0xf8, 0x9, 0x0, 0x0, 0x1ff, 0x0, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x9}, 0x84, 0xa528, 0x8b6, 0x4, 0x0, 0x0, 0x2, 0x0, 0x81, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="18020000000000800000000000000000850000004100000095000000000000004be98911ed523cf4451d51e400cbd30efbb0a73ceb2b050a456c3a6cfd127868ad3fe3f9a9b946c97f9fc091e4c3f4b0a0d7ed298717a480c48868162ff933958cb6a5265519fee4cb1b8b93f0b164770fd40c7a8060ce72beff7cda177e281cf0b7a1a97b2c8c5617bff8c9441a45fd951df19a9c6e933500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xfffff000, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 07:45:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x11000000}, 0x0) 07:45:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x61) [ 2877.466448][ T7055] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x300]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:45:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x12000000}, 0x0) 07:45:23 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x34000) 07:45:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000300)=""/208, 0x0, 0xd0, 0x7fff}, 0x20) [ 2877.523034][ T7055] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:23 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=0x1, 0xffffffffffffffff, 0x1}, 0x10) [ 2877.595998][ T7075] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2877.627312][ T7075] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:23 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0xcc030000, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:23 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x400300) 07:45:23 executing program 0: socketpair(0x10, 0x0, 0x400, &(0x7f0000000400)) 07:45:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x18010000}, 0x0) 07:45:23 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0xd, &(0x7f00000004c0), 0x4) 07:45:23 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) [ 2878.337824][ T7085] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2878.364975][ T7085] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x318]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x16, 0x0, 0x7fff, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 07:45:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x1b000000}, 0x0) 07:45:24 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x41) 07:45:24 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x1000000) 07:45:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x24000000}, 0x0) [ 2878.397469][ T7095] xt_ct_set_helper: 2 callbacks suppressed [ 2878.397485][ T7095] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2878.466246][ T7106] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2878.487668][ T7106] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2878.557725][ T7109] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x425, 0x1, 0x100}, 0x48) 07:45:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/239, 0x26, 0xef, 0x1}, 0x20) 07:45:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x24030000}, 0x0) 07:45:24 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0xe0030000, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:24 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x2000000) 07:45:24 executing program 0: socketpair(0x2a, 0x0, 0x0, &(0x7f0000001580)) [ 2879.223952][ T7116] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x34a]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000033c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003380)=[@ip_tos_u8={{0x11}}], 0x18}, 0x1) 07:45:24 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x481, 0x0) 07:45:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x25000000}, 0x0) 07:45:24 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x3000000) 07:45:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "dc"}]}}, &(0x7f00000001c0)=""/239, 0x2a, 0xef, 0x1}, 0x20) 07:45:24 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001c80)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_clone(0xb204100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2879.260953][ T7116] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2879.283781][ T7122] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:25 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040), 0xffffffffffffff91) 07:45:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x36030000}, 0x0) [ 2879.343306][ T7132] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2879.382379][ T7132] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2879.431052][ T7144] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:25 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000080), 0x10, 0x0}, 0x80d0) 07:45:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x39030000}, 0x0) 07:45:25 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0xe4030000, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x34e]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:25 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$inet(r0, 0x0, 0x0) 07:45:25 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@ip_tos_u8={{0x11}}], 0x18}, 0x0) 07:45:25 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x3340000) 07:45:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x40000000}, 0x0) [ 2880.126505][ T7151] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x48000000}, 0x0) 07:45:25 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xee000000, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/239, 0x1a, 0xef, 0x1}, 0x20) 07:45:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x4c000000}, 0x0) [ 2880.194407][ T7159] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x17000000, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000001c0)=""/239, 0x26, 0xef, 0x1}, 0x20) 07:45:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x100000}]}}, &(0x7f00000001c0)=""/239, 0x26, 0xef, 0x1}, 0x20) [ 2880.239511][ T7159] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2880.306689][ T7173] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:26 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0xf0000000, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:26 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x4000000) 07:45:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xd, 0x4}, {0x6, 0x1}]}]}}, &(0x7f00000001c0)=""/239, 0x36, 0xef, 0x1}, 0x20) 07:45:26 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0xe, &(0x7f00000004c0), 0x4) [ 2880.972531][ T7180] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x38b]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x60000000}, 0x0) 07:45:26 executing program 0: syz_clone(0x20200000, &(0x7f0000000140)="b3d98f6b062759d9ea9a64dc0bc347d21cbb56788d1b94c4f0834ac8fcc748b92cabad9d20541160fbafb83642993d830e4aad9e548d31501ad1c485ebb3cc0931797e593fa7867001550c04", 0x4c, &(0x7f00000001c0), &(0x7f0000000340), &(0x7f0000000240)='#') 07:45:26 executing program 5: socketpair(0x2, 0x1, 0xff, &(0x7f0000001140)) 07:45:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x65580000}, 0x0) [ 2881.052692][ T7187] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x20000221, 0x2, [@ptr]}}, &(0x7f00000001c0)=""/239, 0x26, 0xef, 0x1}, 0x20) 07:45:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x68000000}, 0x0) 07:45:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x6c000000}, 0x0) [ 2881.096222][ T7187] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2881.177409][ T7205] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:27 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0xf6000000, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2881.819513][ T7210] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x398]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:27 executing program 5: socketpair(0x11, 0x2, 0x8, &(0x7f00000008c0)) 07:45:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x74000000}, 0x0) 07:45:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x16, 0x8, 0x0, 0x3}, 0x48) 07:45:27 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x5000000) 07:45:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x7a000000}, 0x0) 07:45:27 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2}, 0x0) 07:45:27 executing program 0: pipe2(&(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsync(r0) 07:45:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x81000000}, 0x0) 07:45:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000000c0)={{0xeb9f, 0x17, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/239, 0x1a, 0xef, 0x1}, 0x20) [ 2881.946784][ T7215] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2881.973411][ T7215] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2882.047607][ T7232] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x24, &(0x7f00000004c0), 0x4) 07:45:28 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0xfa030000, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x39e]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x88470000}, 0x0) 07:45:28 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x6000000) 07:45:28 executing program 5: bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x9) 07:45:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xd, 0x0, 0x4}, 0x48) 07:45:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) close(r0) 07:45:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x88480000}, 0x0) 07:45:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0x1400, 0x5}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000000)="ac", 0x0}, 0x20) 07:45:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0x1419, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000}, 0x48) 07:45:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x88a8ffff}, 0x0) [ 2882.801337][ T7247] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2882.844221][ T7247] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xa00, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000}, 0x48) 07:45:29 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0xffffe000, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2883.513158][ T7265] xt_ct_set_helper: 2 callbacks suppressed [ 2883.513177][ T7265] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x3dc]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xaa3f0000}, 0x0) 07:45:29 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x7000000) 07:45:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x4, 0x1400, 0xa000}, 0x48) 07:45:29 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000000)=@raw=[@btf_id, @ldst={0x0, 0x0, 0x1}, @generic], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:29 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB='X'], &(0x7f00000001c0)='GPL\x00', 0x1, 0xd7, &(0x7f0000000000)=""/215, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xadac0000}, 0x0) [ 2883.662716][ T7270] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xaeac0000}, 0x0) 07:45:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x0, 0x0, 0x0, 0x4}, 0x48) [ 2883.704608][ T7270] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:29 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x8000000) 07:45:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0x1400, 0x5}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200), 0x0, 0x1ff, r0}, 0x38) [ 2883.785126][ T7285] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2883.953677][ T7289] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2884.045108][ T7289] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:29 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x2}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2884.384483][ T7292] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xafac0000}, 0x0) 07:45:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x2, 0x4, 0x1400, 0x5, 0x500}, 0x48) 07:45:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x3fa]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) [ 2884.643894][ T7300] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x4, 0x1400, 0xa}, 0x48) 07:45:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x2, 0x4, 0x1400, 0x5, 0x900}, 0x48) 07:45:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xb0ac0000}, 0x0) 07:45:31 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x9000000) 07:45:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x500]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:31 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x3}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xb1ac0000}, 0x0) 07:45:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff002, 0x81, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x7, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r0, &(0x7f00000004c0), &(0x7f0000000140)=""/224}, 0x20) 07:45:31 executing program 0: syz_open_dev$loop(&(0x7f0000000e40), 0x0, 0x0) [ 2886.279419][ T7307] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2886.306431][ T7307] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2886.337194][ T7313] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2886.411021][ T7317] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:32 executing program 0: syz_clone(0x20005000, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x1, 0x0, 0x2, 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.time_recursive\x00', 0x0, 0x0) 07:45:32 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xa000000) 07:45:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xc3ffffff}, 0x0) 07:45:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xeaffffff}, 0x0) 07:45:32 executing program 0: getrusage(0x0, &(0x7f0000000000)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000800), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$loop(&(0x7f0000000e40), 0x0, 0x0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000f00)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001040), 0xffffffffffffffff) 07:45:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff002, 0x81, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x7, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r0, &(0x7f00000004c0), &(0x7f0000000140)=""/224}, 0x20) [ 2886.788900][ T7331] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xf0ffffff}, 0x0) [ 2886.849284][ T7331] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x600]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:32 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x4}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:32 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xb000000) 07:45:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xf30a0000}, 0x0) 07:45:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x700, 0x1400, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000}, 0x48) 07:45:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff002, 0x81, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x7, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r0, &(0x7f00000004c0), &(0x7f0000000140)=""/224}, 0x20) 07:45:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xfeffffff}, 0x0) 07:45:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x4, 0x1400, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000}, 0x48) 07:45:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xffffa888}, 0x0) [ 2887.147707][ T7346] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:32 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x1a, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000f7ffffffffffffff8d00000000000000400000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x1, 0xc8, &(0x7f0000000200)=""/200, 0x0, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) [ 2887.206618][ T7357] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2887.224928][ T7346] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:33 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xc000000) 07:45:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x7) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x7, 0x2, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x4}, @sack={0x5, 0x2}]}}}}}}}, 0x0) [ 2887.605183][ T7361] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2887.644947][ T7368] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2887.699402][ T7368] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x700]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xffffff7f}, 0x0) 07:45:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff002, 0x81, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x7, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r0, &(0x7f00000004c0), &(0x7f0000000140)=""/224}, 0x20) 07:45:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000d00)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x14}, 0x14}}, 0x0) 07:45:33 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xd000000) 07:45:33 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x5}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xffffffc3}, 0x0) 07:45:33 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000cc0), 0x58000, 0x0) [ 2888.038180][ T7376] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2888.086344][ T7389] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 2888.134618][ T7391] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xffffffea}, 0x0) [ 2888.224382][ T7376] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:33 executing program 0: add_key$keyring(&(0x7f0000004a40), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 07:45:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xfffffff0}, 0x0) 07:45:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x900]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:34 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000cc0), 0x0, 0x0) 07:45:34 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xe000000) 07:45:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xfffffffe}, 0x0) 07:45:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) 07:45:34 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x6}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x100033475}, 0x0) 07:45:34 executing program 5: syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000a40), r0) 07:45:34 executing program 0: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000800), 0xffffffffffffffff) [ 2888.912656][ T7406] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x14}, 0x14}}, 0x0) [ 2888.975673][ T7419] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2889.028520][ T7421] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2889.061882][ T7406] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:34 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f0000000a00)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) 07:45:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000003600)={0x0, 0x0, &(0x7f00000035c0)={&(0x7f0000000f00)={0xe84, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0xe1c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x101, 0x5, "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"}, @ETHTOOL_A_BITSET_BITS={0xc8, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '/dev/ppp\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*=\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'c#{(-,\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, ']\'.^*\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_BITS={0xe4, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '+{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, '.:%*@\xdc:(\x80*(g-\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2d2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '-!\xa7[%^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, ',-*${\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x88, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xda}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb35}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x2d, 0x4, "d61f1cadfb07f3a9cf1412ce4676a9999f4379f83897e730fda4a2e35ad722bbac87e9a7890f92ae71"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1ff}, @ETHTOOL_A_BITSET_MASK={0xa99, 0x5, "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"}]}]}, 0xe84}}, 0x8004) 07:45:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xa00]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x100033476}, 0x0) 07:45:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29}, 0x20) 07:45:35 executing program 5: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0xd, 0x0, 0x0) 07:45:35 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xf000000) 07:45:35 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x7}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x1000000000000}, 0x0) 07:45:35 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x0, 0x9}], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3}]}}, 0x0, 0x2a}, 0x20) [ 2889.788363][ T7434] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x40030000000000}, 0x0) 07:45:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000900)={&(0x7f00000007c0), 0xc, &(0x7f00000008c0)={0x0}}, 0x0) 07:45:35 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)={0x14}, 0x14}}, 0x0) [ 2889.847393][ T7434] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2889.864703][ T7447] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2890.268927][ T7449] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xb00]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:36 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x10000000) 07:45:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0xf}]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) 07:45:36 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@map=0x1, 0xffffffffffffffff, 0xe252b1eb0f23d443}, 0x14) 07:45:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x100000000000000}, 0x0) 07:45:36 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x8}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x9}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 07:45:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x200000000000000}, 0x0) 07:45:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x3}]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) [ 2890.668464][ T7460] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:36 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x14, 0x0, 0x0) 07:45:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x300000000000000}, 0x0) 07:45:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000240)=""/20, 0x8c, 0x14, 0x1}, 0x20) [ 2890.705176][ T7460] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2890.747416][ T7478] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2890.799084][ T7481] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xbaa]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:37 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0xc2003, 0x0) 07:45:37 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x11000000) 07:45:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x400000000000000}, 0x0) 07:45:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x12}]}}, 0x0, 0x2a}, 0x20) 07:45:37 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x9}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:37 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e40)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socketpair(0x23, 0x0, 0x5, &(0x7f0000000000)) 07:45:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x500000000000000}, 0x0) 07:45:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 2891.556985][ T7491] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:37 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 07:45:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x3, &(0x7f0000000780)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 07:45:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x600000000000000}, 0x0) [ 2891.599868][ T7491] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2891.616386][ T7502] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2891.668428][ T7505] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xc00]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x700000000000000}, 0x0) 07:45:38 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000004b80)={0x6, 0x6, &(0x7f0000003a40)=@framed={{}, [@generic, @call, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000003ac0)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:38 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000840)=[{0x0, 0xf0ff7f00000000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 07:45:38 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x12000000) 07:45:38 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0xa}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0x10, 0x6, [@int]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2e}, 0x20) 07:45:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], &(0x7f0000000240)=""/20, 0x8c, 0x14, 0x1}, 0x20) 07:45:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x800000000000000}, 0x0) 07:45:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x3, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x0, 0x5f, 0x2e]}}, 0x0, 0x31, 0x0, 0x3}, 0x20) 07:45:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x900000000000000}, 0x0) [ 2892.437732][ T7520] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2892.480509][ T7530] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2892.488636][ T7520] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xa00000000000000}, 0x0) [ 2892.555910][ T7535] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xc02]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xd, 0x0, 0x4, 0x0, 0x4}, 0x48) 07:45:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xb00000000000000}, 0x0) 07:45:38 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x18010000) 07:45:38 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x1) 07:45:38 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0xb}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xc00000000000000}, 0x0) 07:45:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5}}, @var={0x8}]}}, &(0x7f0000000180)=""/157, 0x42, 0x9d, 0x1}, 0x20) 07:45:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x1}]}, {0x0, [0x2e, 0x5f]}}, 0x0, 0x28}, 0x20) 07:45:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xd00000000000000}, 0x0) 07:45:39 executing program 5: unlink(&(0x7f0000000000)='./file0\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e40)={0x6, 0x3, &(0x7f0000000b80)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000dc0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) [ 2893.308999][ T7544] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:39 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@cgroup=r0}, 0x10) [ 2893.350405][ T7544] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xd00]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:39 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x1b000000) 07:45:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) 07:45:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1, 0x2, &(0x7f0000000080)=@raw=[@map_idx_val], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:39 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xe00000000000000}, 0x0) 07:45:39 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0xc}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:39 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r0, 0x20, &(0x7f0000000380)={&(0x7f0000000200)=""/243, 0xf3, 0x0, &(0x7f0000000300)=""/70, 0x46}}, 0x10) 07:45:39 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xf00000000000000}, 0x0) 07:45:39 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000080)=@raw=[@jmp], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 07:45:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='GPL\x00', 0x1, 0xe8, &(0x7f00000003c0)=""/232, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2894.168922][ T7570] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:39 executing program 5: socketpair(0x22, 0x0, 0xffff, &(0x7f0000000140)) 07:45:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 2894.213672][ T7570] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2894.231090][ T7588] xt_ct_set_helper: 2 callbacks suppressed [ 2894.231107][ T7588] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2894.280693][ T7589] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xe00]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:40 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x24000000) 07:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x2}]}}, 0x0, 0x2a}, 0x20) 07:45:40 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x1000000000000000}, 0x0) 07:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 07:45:40 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0xd}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:40 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000004b80)={0x6, 0x7, &(0x7f0000003a40)=@framed={{}, [@generic, @call, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000003ac0)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x8c}, 0x20) 07:45:40 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x1100000000000000}, 0x0) 07:45:40 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x4, 0x0, 0x0) 07:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2}}, @typedef={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x51]}}, 0x0, 0x44}, 0x20) [ 2895.066470][ T7601] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2895.093690][ T7601] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:40 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x1200000000000000}, 0x0) [ 2895.110013][ T7614] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2895.160389][ T7619] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x1100]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x628400, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 07:45:41 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x1801000000000000}, 0x0) 07:45:41 executing program 5: syz_clone(0x42001000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:45:41 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x24030000) 07:45:41 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0xe}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:41 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x400000002, 0x0) close(r0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) 07:45:41 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x1b00000000000000}, 0x0) 07:45:41 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x2400000000000000}, 0x0) [ 2895.917446][ T7623] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2895.949356][ T7623] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2895.986213][ T7639] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2896.019018][ T7641] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:41 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x25000000) 07:45:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x10}]}]}, {0x0, [0x2e, 0x5f, 0x61, 0x2e]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 07:45:41 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x2403000000000000}, 0x0) [ 2896.224112][ T7646] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2896.379261][ T7646] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x1200]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:42 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x2500000000000000}, 0x0) 07:45:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x0, 0x3, &(0x7f0000000340)=@framed, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001c80)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) 07:45:42 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x36030000) 07:45:42 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40011040) 07:45:42 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x10}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:42 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x3603000000000000}, 0x0) 07:45:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x0, 0x9, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, 0x48) 07:45:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x6, [@int={0x5, 0x0, 0x0, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2e}, 0x20) 07:45:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000006c"], &(0x7f0000000240)=""/20, 0x8c, 0x14, 0x1}, 0x20) 07:45:42 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x3903000000000000}, 0x0) 07:45:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x1}]}}, 0x0, 0x2a}, 0x20) [ 2896.799780][ T7655] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2896.853340][ T7655] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2896.869955][ T7674] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2896.911447][ T7675] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x1601]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5}}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 07:45:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 07:45:43 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x4000000000000000}, 0x0) 07:45:43 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x39030000) 07:45:43 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x11}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000500)={0x2}, 0x8) 07:45:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:43 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x4800000000000000}, 0x0) 07:45:43 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x4c00000000000000}, 0x0) [ 2897.662793][ T7682] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000052c0)={0x11, 0x1, &(0x7f0000005080)=@raw=[@kfunc], &(0x7f0000005100)='syzkaller\x00', 0x9, 0xf1, &(0x7f0000005140)=""/241, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:43 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x402, &(0x7f0000000080)=@raw=[@jmp], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2897.715168][ T7682] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2897.731981][ T7697] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2897.782823][ T7701] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x1803]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:44 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x6000000000000000}, 0x0) 07:45:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x1ff, [{0x0, 0x5}, {0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x44, 0x0, 0x1}, 0x20) 07:45:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x284}, 0x48) 07:45:44 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x40000000) 07:45:44 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x12}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:44 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r0, 0x20, &(0x7f0000000380)={&(0x7f0000000200)=""/243, 0xf3, 0x0, 0x0}}, 0x10) 07:45:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x2e]}}, 0x0, 0x2b}, 0x20) 07:45:44 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x6558000000000000}, 0x0) 07:45:44 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:44 executing program 5: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0xc, 0x0, 0x0) [ 2898.553900][ T7710] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:44 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x6800000000000000}, 0x0) [ 2898.594536][ T7710] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x1e00]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:45 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x1e}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 07:45:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 07:45:45 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x6c00000000000000}, 0x0) 07:45:45 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x48000000) 07:45:45 executing program 0: bpf$LINK_DETACH(0x22, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000dc0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 07:45:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, 0x0, 0x26}, 0x20) 07:45:45 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x7400000000000000}, 0x0) 07:45:45 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001bc0)='syz1\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001d00), 0x101201, 0x0) [ 2899.413633][ T7738] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:45 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x7534030001000000}, 0x0) 07:45:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x1ff, [{0x0, 0x5, 0x2}, {0x0, 0x3}]}]}}, 0x0, 0x3e}, 0x20) [ 2899.465159][ T7738] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2899.487699][ T7752] xt_ct_set_helper: 2 callbacks suppressed [ 2899.487717][ T7752] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2899.583849][ T7758] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x2000]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:45 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x7634030001000000}, 0x0) 07:45:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001000000010000000020000000000000000260001"], 0x0, 0x2a}, 0x20) 07:45:45 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x4c000000) 07:45:45 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:45 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x21}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:45 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d6", 0x1}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$inet(r1, &(0x7f00000018c0)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000001300)='=', 0x1}], 0x1}, 0x0) 07:45:45 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x7a00000000000000}, 0x0) 07:45:45 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0xffffffffffffff15}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000001940)=""/4099}], 0x9, 0x0, 0xffffffffffffff7f}, 0x0) [ 2900.322610][ T7766] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2900.349807][ T7766] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 07:45:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x8100000000000000}, 0x0) [ 2900.366388][ T7777] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x19, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 2900.418354][ T7781] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x2100]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x8847000000000000}, 0x0) 07:45:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000052c0)={0x11, 0x1, &(0x7f0000005080)=@raw=[@kfunc], &(0x7f0000005100)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:46 executing program 5: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 07:45:46 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x60000000) 07:45:46 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x25}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8, [@fwd={0x6}, @typedef={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x51]}}, 0x0, 0x38, 0x0, 0x1}, 0x20) 07:45:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x2e]}}, 0x0, 0x2b}, 0x20) 07:45:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x8848000000000000}, 0x0) 07:45:46 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001c80)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) [ 2901.178649][ T7788] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2901.210368][ T7788] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2901.245994][ T7805] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2901.278661][ T7806] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5}}]}}, 0x0, 0x32}, 0x20) 07:45:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x5c2}, 0x48) 07:45:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x2500]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:47 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x88a8ffff00000000}, 0x0) 07:45:47 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x65580000) 07:45:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f00000000c0)=""/139, 0x2a, 0x3fffffff, 0x1}, 0x20) 07:45:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5}}]}}, 0x0, 0x32}, 0x20) 07:45:47 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x28}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000007140)={0x0, 0x0}, 0x20) 07:45:47 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xaa3f000000000000}, 0x0) 07:45:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 2902.050906][ T7821] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:45:47 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2902.086293][ T7821] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2902.111541][ T7832] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x4}, {0x3}, {0x8, 0x2}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 07:45:47 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xadac000000000000}, 0x0) [ 2902.155759][ T7837] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x2602]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x4}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 07:45:48 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xaeac000000000000}, 0x0) 07:45:48 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000004b80)={0x6, 0x5, &(0x7f0000003a40)=@framed={{}, [@call, @func]}, &(0x7f0000003ac0)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:48 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x68000000) 07:45:48 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x3e}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:48 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x1}, @map_val], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:48 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xafac000000000000}, 0x0) 07:45:48 executing program 0: perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:45:48 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xb0ac000000000000}, 0x0) 07:45:48 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x6c000000) [ 2902.913698][ T7842] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2902.945440][ T7842] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2902.991162][ T7860] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2903.025655][ T7861] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x59}]}}, 0x0, 0x2a, 0x0, 0xa}, 0x20) [ 2903.053678][ T7864] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2903.079348][ T7864] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:49 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xb1ac000000000000}, 0x0) 07:45:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8, [@fwd={0x6}, @typedef={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x51]}}, 0x0, 0x38}, 0x20) 07:45:49 executing program 0: socketpair(0x10, 0x3, 0x0, &(0x7f0000000540)) 07:45:49 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x46}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:49 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x2d02]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:49 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x74000000) 07:45:49 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x20c0, 0x0) 07:45:49 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xc3ffffff00000000}, 0x0) 07:45:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 07:45:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'wg0\x00', 0x20}) 07:45:49 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xeaffffff00000000}, 0x0) 07:45:49 executing program 5: unlink(&(0x7f0000000000)='./file0\x00') bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) [ 2903.797522][ T7876] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2903.901194][ T7876] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:49 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) 07:45:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 07:45:49 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x7a000000) 07:45:49 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x284, 0xffffffffffffffff, 0xae}, 0x48) [ 2904.169386][ T7903] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2904.231515][ T7903] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:50 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x48}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:50 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x4800]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:50 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 07:45:50 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000340)=@framed={{}, [@exit]}, &(0x7f0000000380)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:45:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x2}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 07:45:50 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x81000000) 07:45:50 executing program 5: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000100)=r0, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) close(0xffffffffffffffff) unlink(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 07:45:50 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x88470000) 07:45:50 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000780)={@map=0x1, 0xffffffffffffffff, 0x4}, 0x10) 07:45:50 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xf30a000000000000}, 0x0) 07:45:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a, 0x0, 0xb}, 0x20) 07:45:50 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xfeffffff00000000}, 0x0) [ 2904.759511][ T7925] xt_ct_set_helper: 2 callbacks suppressed [ 2904.759529][ T7925] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2904.819560][ T7930] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:51 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x4c}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x4a03]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:51 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x88480000) 07:45:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e}, 0x20) 07:45:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@ip_ttl={{0x14}}], 0x18}, 0x40001) 07:45:51 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) 07:45:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000c80), r0) 07:45:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {0x5}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}}, 0x0) 07:45:51 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0xffffffff00000000}, 0x0) 07:45:51 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x88a8ffff) 07:45:51 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) [ 2905.633436][ T7952] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:51 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd601da11300300000062d0000000000000000ffff7f000001ff020000000000000000000000000001040090"], 0x0) [ 2905.689012][ T7956] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2905.711446][ T7957] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2905.820818][ T7957] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:52 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x60}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x4c00]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0xc0ed8317, &(0x7f0000000100)={[{@orlov}, {@minixdf}, {@data_writeback}, {@grpid}, {@noblock_validity}, {@nombcache}]}, 0x8, 0x472, &(0x7f0000000140)="$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") 07:45:52 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x9c910000) 07:45:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0xc0ed8317, &(0x7f0000000100)={[{@orlov}, {@minixdf}, {@data_writeback}, {@grpid}, {@noblock_validity}, {@nombcache}]}, 0x8, 0x472, &(0x7f0000000140)="$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") 07:45:52 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x2}, 0x0) 07:45:52 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x9f910000) [ 2906.440010][ T7967] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2906.445577][ T7969] loop5: detected capacity change from 0 to 512 [ 2906.450455][ T7965] loop0: detected capacity change from 0 to 512 [ 2906.461581][ T7970] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2906.477087][ T7969] EXT4-fs: Ignoring removed orlov option [ 2906.483368][ T7969] EXT4-fs (loop5): unsupported inode size: 0 07:45:52 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xbb910000) 07:45:52 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x3}, 0x0) [ 2906.489431][ T7969] EXT4-fs (loop5): blocksize: 1024 [ 2906.489759][ T7965] EXT4-fs: Ignoring removed orlov option [ 2906.505135][ T7967] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2906.522763][ T7965] EXT4-fs (loop0): bad geometry: first data block is 0 with a 1k block and cluster size 07:45:52 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xbc910000) [ 2906.579861][ T7978] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:52 executing program 5: select(0x0, 0x0, &(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)) [ 2906.647053][ T7980] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:45:52 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xbd910000) [ 2906.829753][ T7980] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:52 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x68}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x4e03]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:52 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x4}, 0x0) 07:45:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @remote}, {0x20000010304, @random}, 0x0, {0x2, 0x0, @loopback}}) socket(0x10, 0x0, 0x0) 07:45:52 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x280000, 0x0) 07:45:52 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xc3ffffff) 07:45:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @remote}, {0x20000010304, @random}, 0x0, {0x2, 0x0, @loopback}}) socket(0x10, 0x0, 0x0) [ 2907.305539][ T7989] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:53 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000001980), &(0x7f00000019c0)) 07:45:53 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xeaffffff) 07:45:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @remote}, {0x20000010304, @random}, 0x0, {0x2, 0x0, @loopback}}) socket(0x10, 0x0, 0x0) [ 2907.346628][ T7998] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2907.373024][ T7998] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) 07:45:53 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xf0ffffff) [ 2907.457950][ T8009] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:53 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x6a}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x6000]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @remote}, {0x20000010304, @random}, 0x0, {0x2, 0x0, @loopback}}) socket(0x10, 0x0, 0x0) 07:45:53 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x5}, 0x0) 07:45:53 executing program 0: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) 07:45:53 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xf30a0000) [ 2908.153161][ T8016] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 07:45:53 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xfeffffff) [ 2908.196178][ T8021] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:45:53 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, 0x0) [ 2908.239340][ T8021] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2908.321593][ T8037] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:53 executing program 5: clock_getres(0x0, &(0x7f0000001b00)) 07:45:53 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x6}, 0x0) [ 2908.369931][ T8040] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:45:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[], 0x8, 0x2ee, &(0x7f00000004c0)="$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") write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x20, 0x3, 0x8}}, 0x14) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000900)={0x7, 0x7b, 0x1}, 0x7) getcwd(&(0x7f0000000100)=""/75, 0x4b) socket$nl_route(0x10, 0x3, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) read$watch_queue(0xffffffffffffffff, &(0x7f00000009c0)=""/15, 0xfeae) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r2}, 0x10) dup(r2) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000880)={0x200002, 0x7e9b, 0x5, 0x40, 0x6, 0x4}) r3 = socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000002c0)=0x0) sched_setscheduler(r4, 0x3, &(0x7f0000000440)=0x6) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_XFRM_IF_ID={0x8, 0x2, 0x2}]}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x44}}, 0x0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000180)={0x0}) [ 2908.488636][ T8042] loop5: detected capacity change from 0 to 128 [ 2908.499256][ T8040] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:54 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x6c}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:54 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x6002]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0), r0) 07:45:54 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xffffa888) 07:45:54 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x280000, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 07:45:54 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x7}, 0x0) 07:45:54 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xffffff7f) 07:45:54 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x890) 07:45:54 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) [ 2909.074836][ T8049] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:45:54 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xffffffc3) 07:45:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000e00)) [ 2909.124512][ T8049] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:54 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 07:45:55 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x74}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x6800]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:55 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x280000, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 07:45:55 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xffffffea) 07:45:55 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x8}, 0x0) 07:45:55 executing program 5: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001980), 0xffffffffffffffff) [ 2909.879709][ T8073] xt_ct_set_helper: 2 callbacks suppressed [ 2909.879727][ T8073] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:55 executing program 0: syz_open_dev$vcsa(&(0x7f0000000180), 0x0, 0x82e201) 07:45:55 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x1234c0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.opaque\x00') 07:45:55 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xfffffff0) [ 2909.943416][ T8078] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:45:55 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x1234c0, 0x0) [ 2909.987688][ T8078] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2910.057415][ T8093] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:55 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x1234c0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.opaque\x00') 07:45:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TCFLSH(r0, 0x80047456, 0x20000000) 07:45:56 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x7a}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2910.726772][ T8101] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x6c00]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:56 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x9}, 0x0) 07:45:56 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xfffffffe) 07:45:56 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x1234c0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.opaque\x00') 07:45:56 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x1234c0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200, 0x0) 07:45:56 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x1234c0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.opaque\x00') 07:45:56 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x1234c0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) 07:45:56 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x10002f3ae) [ 2910.805778][ T8105] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2910.854709][ T8105] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2910.871119][ T8115] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2910.873921][ T8117] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 2910.900620][ T8115] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2910.939295][ T8119] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:56 executing program 0: mlock(&(0x7f0000ff7000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ff9000/0x1000)=nil) 07:45:56 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xa}, 0x0) 07:45:56 executing program 5: mremap(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) [ 2911.104782][ T8126] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2911.164824][ T8126] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:57 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x7e}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2911.573574][ T8129] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:57 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) 07:45:57 executing program 0: mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) 07:45:57 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x1000000000000) 07:45:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x7000]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:57 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xb}, 0x0) 07:45:57 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x1234c0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x3ff) 07:45:57 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0xe95, 0x0) close(r0) [ 2911.685848][ T8134] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:45:57 executing program 0: mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) 07:45:57 executing program 5: r0 = socket(0xa, 0x2, 0x3a) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) [ 2911.727630][ T8134] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2911.743160][ T8135] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2911.759414][ T26] audit: type=1400 audit(1690703157.395:96881): avc: denied { setopt } for pid=8144 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 07:45:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000440), 0x1, 0x5d8, &(0x7f0000000c00)="$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") quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f00000006c0)={0x0, 0x22, 0xff0f, 0x0, 0x49ea, 0x47b6de51, 0x0, 0x0, 0x60ff}) 07:45:57 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xc}, 0x0) [ 2911.820696][ T8149] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2911.840171][ T8135] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2911.959767][ T8154] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2912.057806][ T8154] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:45:58 executing program 0: mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 07:45:58 executing program 5: mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x7ffffffff000, 0x0, &(0x7f0000ffa000/0x4000)=nil) 07:45:58 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x82}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:58 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x40030000000000) [ 2912.391276][ T8159] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2912.418051][ T8159] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2912.439859][ T8163] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x7001]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:58 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xd}, 0x0) 07:45:58 executing program 5: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x1) 07:45:58 executing program 0: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x12) 07:45:58 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x100000000000000) 07:45:58 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x24000005) 07:45:58 executing program 5: mlock(&(0x7f0000ff8000/0x2000)=nil, 0x2000) mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) 07:45:58 executing program 0: mlock(&(0x7f0000ff7000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x40000000, 0x0, &(0x7f0000ff9000/0x1000)=nil) 07:45:58 executing program 5: r0 = socket(0x2, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000080)={&(0x7f0000000000), 0x14, &(0x7f0000000040)={0x0}}, 0x0) [ 2912.544868][ T8168] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2912.577524][ T8168] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2912.638618][ T8173] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2912.672511][ T8182] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:58 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x84}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:58 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xe}, 0x0) 07:45:58 executing program 0: mlock(&(0x7f0000ff7000/0x3000)=nil, 0x3000) r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ff9000/0x1000)=nil) [ 2913.235667][ T26] audit: type=1400 audit(1690703158.875:96882): avc: denied { map } for pid=8185 comm="syz-executor.0" path="/dev/usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2913.263229][ T8186] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2913.311809][ T8190] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x7002]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:59 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000180)='system_u:object_r:xen_device_t:s0\x00', 0x22) 07:45:59 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x200000000000000) 07:45:59 executing program 0: r0 = syz_io_uring_setup(0x5182, &(0x7f0000000000), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000080)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x4088112, r0, 0x0) 07:45:59 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xf}, 0x0) 07:45:59 executing program 0: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 07:45:59 executing program 5: munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 07:45:59 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000000)) [ 2913.417049][ T8196] SELinux: Context system_u:object_r:xen_device_t:s0 is not valid (left unmapped). 07:45:59 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2913.473612][ T8204] mmap: syz-executor.5 (8204) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 2913.546205][ T8210] xt_CT: You must specify a L4 protocol and not use inversions on it 07:45:59 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0xf0}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:45:59 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 07:45:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001d0001"], 0x24}}, 0x0) 07:45:59 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x11}, 0x0) 07:45:59 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x300000000000000) 07:45:59 executing program 0: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x17) 07:45:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x7400]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:45:59 executing program 5: syz_io_uring_setup(0x4f69, &(0x7f0000000000), &(0x7f0000fbc000/0x2000)=nil, &(0x7f0000fb4000/0x2000)=nil, &(0x7f0000000080), 0x0) madvise(&(0x7f0000fb5000/0x2000)=nil, 0x2000, 0xa) 07:45:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x9, 0x502, 0x0, 0x9, 0x0, 0x1}, 0x48) 07:45:59 executing program 5: mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x40000000, 0x3, &(0x7f0000ffa000/0x4000)=nil) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 07:45:59 executing program 5: r0 = socket(0xa, 0x3, 0x101) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={0x0}}, 0x0) 07:45:59 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ff8000/0x4000)=nil, 0x4000, &(0x7f00000001c0)='\x00') mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) [ 2914.291960][ T8223] validate_nla: 5 callbacks suppressed [ 2914.291975][ T8223] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2914.347793][ T8225] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:46:00 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x12}, 0x0) 07:46:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'\x00', 0x2}) 07:46:00 executing program 0: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 07:46:00 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0xf6}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:00 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x334000000000000) 07:46:00 executing program 0: syz_io_uring_setup(0x7ed6, &(0x7f00000001c0), &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffa000/0x4000)=nil) [ 2914.953815][ T8244] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2914.979821][ T8240] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2915.013817][ T8250] xt_ct_set_helper: 2 callbacks suppressed [ 2915.013835][ T8250] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x7a00]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:00 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) mlock(&(0x7f0000ff8000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ff7000/0x3000)=nil, 0x3000) 07:46:00 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x1b}, 0x0) 07:46:00 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x400000000000000) 07:46:00 executing program 5: syz_io_uring_setup(0x0, 0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, 0x0, 0x0) 07:46:00 executing program 0: mlock(&(0x7f0000faf000/0x11000)=nil, 0x11000) syz_io_uring_setup(0x4f69, &(0x7f0000000000), &(0x7f0000fbc000/0x2000)=nil, &(0x7f0000fb4000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 2915.142952][ T8256] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2915.174743][ T8260] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2915.254848][ T8265] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:01 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x122}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:01 executing program 5: mlock(&(0x7f0000ff7000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) 07:46:01 executing program 0: munmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 07:46:01 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x24}, 0x0) 07:46:01 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x500000000000000) 07:46:01 executing program 0: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) [ 2915.807103][ T8272] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2915.836883][ T8269] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2915.868241][ T8269] net_ratelimit: 10 callbacks suppressed [ 2915.868251][ T8269] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2915.890415][ T8278] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x7e00]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:01 executing program 0: mremap(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) 07:46:01 executing program 5: mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ff9000/0x1000)=nil) madvise(&(0x7f0000ff1000/0xf000)=nil, 0xf000, 0x13) 07:46:01 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x25}, 0x0) 07:46:01 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x600000000000000) 07:46:01 executing program 5: syz_io_uring_setup(0x2452, &(0x7f0000000180)={0x0, 0x27a4}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000200), 0x0) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6) [ 2915.997458][ T8284] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2916.040450][ T8284] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2916.055949][ T8287] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2916.084432][ T8287] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2916.121111][ T8292] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:02 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x134}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:02 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000c98000/0x4000)=nil, &(0x7f0000c9b000/0x3000)=nil, &(0x7f0000c9a000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000c98000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000c9c000/0x3000)=nil, &(0x7f0000c9d000/0x4000)=nil, &(0x7f0000c9d000/0x2000)=nil, &(0x7f0000c9f000/0x2000)=nil, &(0x7f0000c9d000/0x1000)=nil, 0x0}, 0x68) mlock(&(0x7f0000c9b000/0x2000)=nil, 0x2000) mremap(&(0x7f0000fb0000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000c98000/0x3000)=nil) 07:46:02 executing program 5: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x8) 07:46:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x48}, 0x0) 07:46:02 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x700000000000000) 07:46:02 executing program 0: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) [ 2916.702950][ T8297] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2916.735552][ T8302] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2916.778653][ T8305] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:02 executing program 0: r0 = socket(0xa, 0x3, 0x101) connect$802154_dgram(r0, &(0x7f0000000000), 0x14) 07:46:02 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000d79000/0x1000)=nil, &(0x7f0000d79000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000d7c000/0x1000)=nil, &(0x7f0000d7a000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000d7c000/0x4000)=nil, &(0x7f0000d7f000/0x10000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0}, 0x68) madvise(&(0x7f0000d77000/0x3000)=nil, 0x3000, 0x0) 07:46:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x4c}, 0x0) 07:46:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x8400]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:02 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x800000000000000) 07:46:02 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:cron_log_t:s0\x00', 0x20) [ 2916.898589][ T8317] SELinux: Context system_u:object_r:cron_log_t:s0 is not valid (left unmapped). [ 2916.914073][ T8315] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2916.978453][ T8314] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2916.996016][ T8319] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_getneigh={0x20, 0x1e, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x62001}}, 0x20}}, 0x0) 07:46:03 executing program 0: mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) syz_io_uring_setup(0x261a, &(0x7f0000000100), &(0x7f0000e0b000/0x2000)=nil, &(0x7f0000c94000/0x3000)=nil, &(0x7f0000000180), 0x0) syz_io_uring_setup(0x67a6, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000c38000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 07:46:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x60}, 0x0) 07:46:03 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x166}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:03 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x900000000000000) 07:46:03 executing program 5: syz_io_uring_setup(0x4f69, &(0x7f0000000000), &(0x7f0000fbc000/0x2000)=nil, &(0x7f0000fb4000/0x2000)=nil, 0x0, 0x0) madvise(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x10) 07:46:03 executing program 0: r0 = socket(0xa, 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x20000880) 07:46:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x68}, 0x0) [ 2917.567674][ T8327] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:03 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080), 0xfffffffffffffffe) [ 2917.603133][ T8329] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2917.619449][ T8332] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2917.657076][ T8334] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x8602]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:03 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000180)='system_u:object_r:etc_runtime_t:s0\x00', 0x23) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x5f9003, 0x0) 07:46:03 executing program 5: munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 07:46:03 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xa00000000000000) 07:46:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x6c}, 0x0) 07:46:03 executing program 5: mlock(&(0x7f0000ff7000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ff9000/0x1000)=nil) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ff9000/0x1000)=nil, 0x1000, &(0x7f0000000000)='(\x00') [ 2917.738083][ T8345] SELinux: Context system_u:object_r:etc_runtime_t:s0 is not valid (left unmapped). [ 2917.760746][ T26] audit: type=1400 audit(1690703163.395:96883): avc: denied { ioctl open } for pid=8339 comm="syz-executor.0" path=2F6465762F6273672F2331363239202864656C6574656429 dev="devtmpfs" ino=1629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:etc_runtime_t:s0" [ 2917.894295][ T8352] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:04 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x170}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:04 executing program 0: syz_io_uring_setup(0x7d8a, &(0x7f0000000000), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff8000/0x4000)=nil, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x17) 07:46:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x74}, 0x0) 07:46:04 executing program 5: r0 = socket(0xa, 0x2, 0x3a) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, 0x0, 0x0) 07:46:04 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xb00000000000000) 07:46:04 executing program 5: mlock(&(0x7f0000ffa000/0x1000)=nil, 0x1000) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ff9000/0x1000)=nil) [ 2918.489660][ T8365] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x8b03]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x7a}, 0x0) 07:46:04 executing program 0: mlock(&(0x7f0000ff8000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 07:46:04 executing program 5: mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) mremap(&(0x7f0000fb0000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000c98000/0x3000)=nil) mlock2(&(0x7f0000f27000/0x2000)=nil, 0x2000, 0x0) 07:46:04 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xc00000000000000) 07:46:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) [ 2918.729899][ T8379] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:04 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x1a8}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x118}, 0x0) 07:46:04 executing program 0: mlock(&(0x7f0000ff7000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) 07:46:04 executing program 5: r0 = socket(0xa, 0x2, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 07:46:04 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xd00000000000000) 07:46:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="1c0000001e00fff2"], 0x24}}, 0x0) [ 2919.270001][ T26] audit: type=1400 audit(1690703164.905:96884): avc: denied { ioctl } for pid=8381 comm="syz-executor.5" path="socket:[335724]" dev="sockfs" ino=335724 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2919.318697][ T8388] validate_nla: 13 callbacks suppressed [ 2919.318729][ T8388] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2919.339842][ T8390] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:46:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x8c00]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:05 executing program 0: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x8) 07:46:05 executing program 5: mremap(&(0x7f0000ff8000/0x2000)=nil, 0x7ffffffff002, 0x7ffffffff000, 0x0, &(0x7f0000ffa000/0x4000)=nil) 07:46:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x300}, 0x0) 07:46:05 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xe00000000000000) 07:46:05 executing program 0: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) [ 2919.484655][ T8398] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2919.515667][ T8402] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:46:05 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x1ca}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:05 executing program 5: syz_io_uring_setup(0x3653, &(0x7f0000000100), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 07:46:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x324}, 0x0) 07:46:05 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0xf0ff7f}}, 0x0) 07:46:05 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xf00000000000000) 07:46:05 executing program 0: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) sendmsg$802154_dgram(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) [ 2920.195510][ T8413] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2920.227684][ T8412] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2920.255592][ T8419] xt_ct_set_helper: 2 callbacks suppressed [ 2920.255609][ T8419] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x9803]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000440)={@empty, @ipv4={'\x00', '\xff\xff', @empty}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) 07:46:05 executing program 0: mlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xf) 07:46:05 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x1000000000000000) 07:46:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x336}, 0x0) 07:46:06 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) timer_create(0x0, &(0x7f0000000100)={0x0, 0x21}, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x4, 0x0, 0x6}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) [ 2920.343287][ T8423] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2920.377053][ T8429] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2920.457640][ T8433] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:06 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x21a}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:06 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x1100000000000000) 07:46:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001300010000000000f38a7ce2000000000a00a9"], 0x24}}, 0x0) 07:46:06 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x339}, 0x0) 07:46:06 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) timer_create(0x0, &(0x7f0000000100)={0x0, 0x21}, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x4, 0x0, 0x6}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) [ 2921.049032][ T8437] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2921.073692][ T8437] net_ratelimit: 14 callbacks suppressed [ 2921.073704][ T8437] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="240000001e00fff20e6f963c85007cee0a"], 0x24}}, 0x0) [ 2921.094895][ T8439] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2921.104242][ T8438] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2921.120069][ T8444] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x9c01]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:06 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x1200000000000000) 07:46:06 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x500}, 0x0) [ 2921.168715][ T8438] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2921.184289][ T8446] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 07:46:06 executing program 5: mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ff1000/0xf000)=nil, 0xf000, 0x15) 07:46:06 executing program 5: r0 = socket(0xa, 0x3, 0x101) bind$802154_dgram(r0, &(0x7f00000001c0)={0x24, @long}, 0x14) [ 2921.252656][ T8451] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2921.291146][ T8453] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:07 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x600}, 0x0) [ 2921.337855][ T8459] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2921.490326][ T8461] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:07 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x226}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:07 executing program 5: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000040)='/dev/loop#\x00') 07:46:07 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x1801000000000000) 07:46:07 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x700}, 0x0) 07:46:07 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) timer_create(0x0, &(0x7f0000000100)={0x0, 0x21}, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x4, 0x0, 0x6}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 07:46:07 executing program 5: add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) [ 2921.944623][ T8467] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2921.980656][ T8468] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2921.997061][ T8475] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x9e03]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:07 executing program 5: mremap(&(0x7f0000fb0000/0x1000)=nil, 0x200000, 0x3000, 0x3, &(0x7f0000c98000/0x3000)=nil) 07:46:07 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x1b00000000000000) 07:46:07 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x900}, 0x0) 07:46:07 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) timer_create(0x0, &(0x7f0000000100)={0x0, 0x21}, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x4, 0x0, 0x6}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 07:46:07 executing program 5: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x15) [ 2922.106711][ T8481] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2922.136997][ T8483] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2922.208770][ T8489] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:08 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x234}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:08 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 07:46:08 executing program 5: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000040)='/dev/bsg\x00') madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa) 07:46:08 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x2400000000000000) 07:46:08 executing program 0: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x14) 07:46:08 executing program 5: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000) syz_io_uring_setup(0x5182, &(0x7f0000000000), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000080)) [ 2922.813517][ T8495] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2922.849520][ T8502] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xa800]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:08 executing program 0: mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) mremap(&(0x7f0000fb0000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000c98000/0x3000)=nil) syz_io_uring_setup(0x4da7, &(0x7f0000000000), &(0x7f0000ea7000/0x6000)=nil, &(0x7f0000c97000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 07:46:08 executing program 5: mlock(&(0x7f0000faf000/0x11000)=nil, 0x11000) mremap(&(0x7f0000fb0000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000c98000/0x3000)=nil) 07:46:08 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xaf3}, 0x0) 07:46:08 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x2403000000000000) 07:46:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1f0000001e0001"], 0x24}}, 0x0) [ 2923.006784][ T8514] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2923.067563][ T8516] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:09 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x252}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:09 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xb00}, 0x0) 07:46:09 executing program 0: socket(0xa, 0x3, 0x3a) 07:46:09 executing program 5: mlock(&(0x7f0000ff8000/0x3000)=nil, 0x3000) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffa000/0x2000)=nil, 0x2000, &(0x7f0000000000)='\x00') 07:46:09 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x2500000000000000) 07:46:09 executing program 5: r0 = socket(0xa, 0x2, 0x3a) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0x10}}, 0x4040095) [ 2923.709821][ T8529] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xa801]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:09 executing program 5: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) 07:46:09 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ff8000/0x4000)=nil, 0x4000, &(0x7f0000000000)='\x00') madvise(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) 07:46:09 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xc00}, 0x0) 07:46:09 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x3603000000000000) 07:46:09 executing program 0: madvise(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x17) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) [ 2923.940879][ T8543] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:10 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x270}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:10 executing program 0: mlock(&(0x7f0000ffa000/0x1000)=nil, 0x1000) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 07:46:10 executing program 5: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x9) 07:46:10 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x3903000000000000) 07:46:10 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xd00}, 0x0) 07:46:10 executing program 0: r0 = socket(0xa, 0x2, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) [ 2924.510782][ T8552] validate_nla: 15 callbacks suppressed [ 2924.510801][ T8552] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2924.546378][ T26] audit: type=1400 audit(1690703170.185:96885): avc: denied { getopt } for pid=8554 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2924.566755][ T8551] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:46:10 executing program 0: syz_io_uring_setup(0x17d1, &(0x7f0000000400), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x9) 07:46:10 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) 07:46:10 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 07:46:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xaa0b]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:10 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x4000000000000000) 07:46:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001e0001"], 0x24}}, 0x0) [ 2924.684165][ T8559] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2924.722836][ T8565] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:46:11 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x298}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xf00}, 0x0) 07:46:11 executing program 0: mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) mremap(&(0x7f0000fb0000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000fff000/0x1000)=nil) mlock2(&(0x7f0000f27000/0x2000)=nil, 0x2000, 0x0) 07:46:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@getneigh={0x14, 0x1e, 0x78e04baffe2fb39, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 07:46:11 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x4800000000000000) 07:46:11 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 2925.426102][ T8577] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:46:11 executing program 0: mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x40000000, 0x3, &(0x7f0000ffa000/0x4000)=nil) 07:46:11 executing program 5: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x1) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ff8000/0x4000)=nil, 0x4000, &(0x7f0000000000)='\x00') 07:46:11 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x4c00000000000000) 07:46:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xb401]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:11 executing program 0: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x14) 07:46:11 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f00000000c0)={0xa1, 0x3}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2925.468208][ T8578] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2925.496707][ T8587] xt_ct_set_helper: 2 callbacks suppressed [ 2925.496725][ T8587] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2925.567852][ T8595] usb usb5: usbfs: process 8595 (syz-executor.5) did not claim interface 0 before use [ 2925.568036][ T8590] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2925.688578][ T8598] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:11 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x2c2}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x1100}, 0x0) 07:46:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8906, 0x0) 07:46:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000940), 0x4) 07:46:11 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x6000000000000000) 07:46:11 executing program 5: socket$igmp6(0xa, 0x3, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f00000004c0), 0xffffffffffffffff) 07:46:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000640)={'ip6gre0\x00', 0x0}) [ 2926.293299][ T8603] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:46:11 executing program 5: ioctl$PPPIOCUNBRIDGECHAN(0xffffffffffffffff, 0x7434) 07:46:12 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x1200}, 0x0) [ 2926.335428][ T8603] net_ratelimit: 14 callbacks suppressed [ 2926.335439][ T8603] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2926.356811][ T8605] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2926.366799][ T8615] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xdc00]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000880)={'ip6tnl0\x00', 0x0}) 07:46:12 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 2926.389473][ T8605] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2926.437098][ T8617] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2926.467817][ T8617] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2926.556679][ T8625] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:12 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x2c8}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8912, 0x0) 07:46:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000f00), r0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000f80)={0x14}, 0x14}}, 0x0) 07:46:12 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x6558000000000000) 07:46:12 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x1801}, 0x0) 07:46:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', 0x0}) 07:46:12 executing program 0: select(0x40, &(0x7f0000000e80), 0x0, 0x0, &(0x7f0000000f40)={0x0, 0xea60}) [ 2927.198564][ T8633] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2927.229085][ T8639] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:12 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f00000001c0)) 07:46:12 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x6800000000000000) 07:46:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xdc03]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:12 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x1b00}, 0x0) 07:46:12 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000640), 0x309003, 0x0) [ 2927.242184][ T8634] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2927.363765][ T8648] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2927.431492][ T8652] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2927.504433][ T8650] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000640)={'ip6gre0\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @loopback, 0x0, 0x0, 0x5, 0x3}}) 07:46:13 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x6c00000000000000) 07:46:13 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x300}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:13 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x2400}, 0x0) 07:46:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000c80)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x14, 0x8, 0x6, 0x801}, 0x14}}, 0x0) 07:46:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000880)={'ip6tnl0\x00', &(0x7f0000000800)={'ip6gre0\x00', 0x0, 0x0, 0x3f, 0x20, 0x2df89351, 0x10, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @remote, 0x80, 0x8000, 0x80000000, 0xaa}}) 07:46:13 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x2403}, 0x0) 07:46:13 executing program 0: ptrace$ARCH_GET_GS(0x1e, 0xffffffffffffffff, 0x0, 0x1004) [ 2928.062801][ T8659] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2928.086257][ T8665] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'ip6tnl0\x00', &(0x7f0000000800)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @remote}}) [ 2928.110012][ T8662] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xec01]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:13 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x7400000000000000) 07:46:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000480)={'NETMAP\x00'}, &(0x7f00000004c0)=0x1e) 07:46:13 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) 07:46:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x14}, 0x14}}, 0x0) [ 2928.158330][ T8668] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:13 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640), 0x309003, 0x0) ioctl$PPPIOCUNBRIDGECHAN(r0, 0x7434) 07:46:13 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x6, &(0x7f0000000000)=@framed={{}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @exit]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2928.320455][ T8688] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:14 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x7a00000000000000) 07:46:14 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x318}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x2500}, 0x0) 07:46:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000880)={'ip6tnl0\x00', &(0x7f0000000800)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x20, 0x2df89351, 0x10, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @remote, 0x80, 0x8000, 0x80000000, 0xaa}}) 07:46:14 executing program 0: madvise(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0) mlock(&(0x7f00009cd000/0x1000)=nil, 0x1000) [ 2928.945640][ T8699] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0xfa03]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) 07:46:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x3603}, 0x0) 07:46:14 executing program 5: ioctl$PPPIOCGIDLE32(0xffffffffffffffff, 0x8008743f, 0x0) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) socket$igmp6(0xa, 0x3, 0x2) ioctl$PPPIOCGIDLE32(0xffffffffffffffff, 0x8008743f, 0x0) write$ppp(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x40000) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) syz_genetlink_get_family_id$batadv(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:46:14 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x8100000000000000) 07:46:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000f00), r0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000001040)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001000)={&(0x7f0000000f80)={0x14}, 0x14}}, 0x0) 07:46:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000940)={'ip6_vti0\x00', &(0x7f00000008c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, 0x0, 0x0, 0x0, 0x9}}) 07:46:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x3903}, 0x0) [ 2929.182072][ T8717] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:15 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x328}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:15 executing program 5: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000540)={{{@in=@multicast2, @in6=@empty}}, {{@in=@empty}, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0xe8) 07:46:15 executing program 0: gettid() sched_rr_get_interval(0x0, 0x0) keyctl$describe(0x6, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000e80), 0x0, &(0x7f0000000f00)={0x9}, &(0x7f0000000f40)={0x0, 0xea60}) 07:46:15 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x8847000000000000) [ 2929.746025][ T8722] validate_nla: 13 callbacks suppressed [ 2929.746041][ T8722] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:46:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000640)={'ip6gre0\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @loopback}}) 07:46:15 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x3faa}, 0x0) 07:46:15 executing program 0: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000180)) 07:46:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:15 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x8848000000000000) 07:46:15 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCUNBRIDGECHAN(0xffffffffffffffff, 0x7434) ioctl$PPPIOCGIDLE32(0xffffffffffffffff, 0x8008743f, &(0x7f0000000040)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$PPPIOCSDEBUG(r0, 0x40047440, 0x0) r1 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$MRT6_TABLE(r1, 0x29, 0xcf, &(0x7f0000000140)=0xfd, 0x4) ioctl$PPPIOCGIDLE32(r0, 0x8008743f, &(0x7f0000000180)) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f00000001c0)=0x3) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000200)=0x8000) write$ppp(0xffffffffffffffff, &(0x7f0000000240)="fff082e705293c6e6d8dade2a2109c83ea5c451a00bc01ad8f845acee18ed2dca9b44df6bffce8a4362e98967e6d66914cca28ef638e6aedab7cc8caeae502c9a16faf4343df8035a713f29973124cfce75730f57d201a00a148225777e8ec1cf4fa57bc5da6e4558598d5d54b6af9addc98c45ec4ab419c12b143", 0x7b) ioctl$PPPIOCGIDLE32(r0, 0x8008743f, &(0x7f00000002c0)) socket(0x25, 0x3, 0x1ff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x5c, 0x0, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x80}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xaf}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x5c}}, 0x40000) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) ioctl$PPPIOCSMRRU(r0, 0x4004743b, 0x0) 07:46:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x14, 0x8, 0x6, 0x801}, 0x14}}, 0x0) 07:46:15 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x4000}, 0x0) [ 2929.934325][ T8732] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2929.981646][ T8737] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2930.133989][ T8746] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:46:16 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x332}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:16 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x88a8ffff00000000) 07:46:16 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x4788}, 0x0) 07:46:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000640)={'ip6gre0\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @loopback, 0x0, 0x7}}) 07:46:16 executing program 0: r0 = getpid() ptrace$ARCH_MAP_VDSO_X32(0x1e, r0, 0x0, 0x2001) 07:46:16 executing program 5: syz_genetlink_get_family_id$batadv(&(0x7f00000004c0), 0xffffffffffffffff) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:46:16 executing program 0: prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) [ 2930.604121][ T8754] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2930.635206][ T8749] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2930.671499][ T8761] xt_ct_set_helper: 2 callbacks suppressed [ 2930.671516][ T8761] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x14}, 0x14}}, 0x0) 07:46:16 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x4800}, 0x0) 07:46:16 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000680), r0) syz_genetlink_get_family_id$nfc(&(0x7f0000000b40), r0) 07:46:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x0, 0x2]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:16 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x9c91000000000000) [ 2930.788017][ T8765] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2930.824350][ T8769] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2930.917424][ T8773] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:17 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0xfffffffffffffffe}}, 0x0) 07:46:17 executing program 5: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000e80), 0x8) 07:46:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x4888}, 0x0) 07:46:17 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x34a}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:17 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x9f91000000000000) 07:46:17 executing program 5: timer_create(0x0, &(0x7f0000000100)={0x0, 0x21}, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) fsopen(&(0x7f00000014c0)='sockfs\x00', 0x0) 07:46:17 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) syz_open_procfs(0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x200052, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[], 0x1c) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 2931.467584][ T8779] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2931.510995][ T26] audit: type=1400 audit(1690703177.155:96886): avc: denied { mount } for pid=8783 comm="syz-executor.0" name="/" dev="ramfs" ino=336663 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2931.543921][ T8779] net_ratelimit: 14 callbacks suppressed [ 2931.543932][ T8779] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2931.565144][ T8781] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2931.574815][ T8788] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:17 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 07:46:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x0, 0x3]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x4c00}, 0x0) 07:46:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000018c0)={'syztnl1\x00', 0x0}) [ 2931.600318][ T8781] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2931.622089][ T26] audit: type=1400 audit(1690703177.255:96887): avc: denied { unmount } for pid=3086 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 07:46:17 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xaef3020001000000) 07:46:17 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmmsg$inet6(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000012c0)="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", 0x309}], 0x1, &(0x7f0000002780)=[@dontfrag={{0x14, 0x29, 0x3e, 0x1}}, @dstopts_2292={{0x158, 0x29, 0x4, {0x0, 0x28, '\x00', [@hao={0xc9, 0x10, @empty}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}, @enc_lim, @hao={0xc9, 0x10, @remote}, @generic={0x0, 0x98, "558ffbc55cb74207e917ce1024e826cfcd849c7bc79cad0be6840c6af292e04b497106d5170d746d4960a6906c66b59ee5556c29d52e7b4a552b50ea209a7f691c1248372039d9ee3a20a633dbd152de0beaea87a1c0f71a9bfb6507df22bad40b7aef654822756c4a8a335da7336bd12c827e341321ed2f771dbeb77f0950cbc0f9d816e5075ab0a1a7fe9fd1331899298f350cd8ed46b1"}, @calipso={0x7, 0x50, {0x0, 0x12, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @enc_lim, @pad1, @generic={0x0, 0xb, "d8b3ac5c14fba68d806acd"}]}}}], 0x170}}], 0x2, 0x0) [ 2931.707591][ T8792] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 2931.794405][ T8802] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2931.814622][ T8798] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:17 executing program 0: r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000200)={0x7}, 0x0) [ 2931.946434][ T8804] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:17 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x364}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:17 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xbb91000000000000) 07:46:17 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000001bc0), 0x0, 0x0) 07:46:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 07:46:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) [ 2932.365371][ T8814] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2932.393857][ T8817] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2932.403426][ T8816] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x0, 0x4]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001700), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 07:46:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4}, 0xc) 07:46:18 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 07:46:18 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xbc91000000000000) 07:46:18 executing program 5: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x118) 07:46:18 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x339}, 0x0) [ 2932.567136][ T8824] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2932.608873][ T8827] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2932.648872][ T8829] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2932.676767][ T8833] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:18 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x388}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:18 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x6800}, 0x0) 07:46:18 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x324}, 0x0) 07:46:18 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xbd91000000000000) 07:46:18 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x6, &(0x7f0000000040)=0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r4 = syz_open_dev$vcsn(&(0x7f0000000500), 0x8000000000000001, 0x286280) r5 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r6 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r7 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000680)='devices.deny\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000001b00)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) io_submit(r1, 0x9, &(0x7f0000001d80)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0xdd, r2, &(0x7f0000000140)="b55f9521a835631dec01b9732ff79aba4c11fc91d59ec1e716a306fd43319d2b87dd02867e7a56f1bb9e6f34376d", 0x2e, 0x0, 0x0, 0x2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f0000000280)="22907cf5fb41b6413c07b1616afb1bd010faf5b89265c5acefb0b77a97337e3655cb81918ce585ba5fae88b233b9ac5dcd9988033a5a5187136c9571ab79d4360b5d8292ed53b66039f4f8cbe65b77e6f20938bcfb6f4ec554316e0301ddf889f3c28b11ab826193d5519e1ce99892aae4e3aa564650adb23160faeae40a8125137015a697", 0x85, 0x7, 0x0, 0x3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0xe, 0x1ff, r0, &(0x7f0000000380)="83b7ff2da7c78a6cafc8dfcbf255e68d5fe23ba42ad3590eb1a4aa36e287fc55d1d2c999d47d88a3d08d58f1b8fa11ff2d6cb8c27211fdd6688bf645f1675a0831605506949260bbd2329acc2ae6d14331709b4682ab6f270992947f450950987dc873b35c3ab68a1eaf3f345dc56340a70be57f18ef7cdd9aaf996d67465ad25f4fd5d99966019cb22aaaa48fd604016c4787c95eae1c34cd68fcc18c7be283e49d4c7eaa2ce0ef48c904a4290b54128d84c04f9b49f85e5802c5a2aeae3727456e2b099899", 0xc6, 0x2d, 0x0, 0x2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0xf196, r3, &(0x7f0000000900)="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", 0x1000, 0x7, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0x9, r4, &(0x7f0000000540)="04b2e327b758a8fb5757e49515698542afb14fb8a88d82a54e88dfb63d4c33875c7e1ae8d0863232a12c8df72c33bb1d6ccc0a57cfc19909066db9a4b3db792dae97562713a31ee9592bdce4b07b11caf3d933aca840b2177673ea0b58c030e6200875d76fb494dba7f58c76bd97bb0281781b0e61d39ff01107a4e4b059d95ba1125d8ddf0e3b93e9baeb191ef9bf878eb25c44ca8e1361c2d6adddc72dbbab3053986e32d73658dc623a9be06b8a0426ad97b8d784f6b10641a07e767eea8759638862bb690e76727465ede02812d094432ba24ba12a205def7e123c5e55fde57eb30288f79cfc", 0xe8, 0x9, 0x0, 0x3, r5}, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x6, 0x20, r7, &(0x7f0000001900)="ef37e6eb68f9e47f205d7ccf4d4332067a70fcb89cadf9934f96f8ef90589a565a8f4025bf1b36d55136ef686fb3b5b8fb3d161b6099d7d7de29f61858762a39eeadd08ff066137ba34bfde9ea3beeed3efe1f8f78ac2698ff83c7bfe6ee98435a8db135340b135325d5a296f7a0706534e4d5d34fb64eeda7473fa33774a628a13515ff1384756593bf530cbe935ef7c73686e27ba2c3bcd85581ce", 0x9c, 0x3, 0x0, 0x2}, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x6, 0x1, r0, &(0x7f0000001a00)="64be18fc459821a338d2ffbf9562304fa6c09924e2eef8ead847b94ef052ef21a950d3fc1ff29c42760e925eeff78075a94f868f58bca704f2c6fe57ae23e13df8c3c0ac407274e1dd4da149f976599ff8d5a0e224581b81de27a0f4c2f5899f7725e7f362e536b0cc932a1bc59bd463bad69b359e9fc622343c6c8aaf70e7cf1cebb5cc99a7d3658cae9288c390135579727e3382dc4dae8987c3f91ba7bf75516481f3a74f6ff46883fa7edcf9aee26576a368f6873804160a6214d1522a32", 0xc0, 0x3f, 0x0, 0x2}, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x2, 0x2, r8, &(0x7f0000001b40)="f98d232128f5a148cb35fb419e7d82f940fb3cc16d662ce3cd24a5a2a4210b1201a3659612a14b2d3ea7476a5f4efa433dbbb032ac494a3056b56baa36b76ecfada49eb18e8bca925598f08f7f06aebe68d45ad15d5c30104a01c4016f69d13b8c57eb5432df7d545c85ee88b44e24e3613a2f6bf9fbe8ddefc0230b57f074ed52e7b77012893469d5803c9a261fd35619dfe6883ec5e0a7a6665981dc0d34cf91bc4e4498ba837655f7e0963765cae603e41a22bac23916836b431978248fc29596886e184b2790157c8ece72f29e73bd10fac285c75ec332403766074293a2c40a1c175beed0c09649c8c1c800d65a360f2f4b2ecb4f1651", 0xf9, 0x9e7, 0x0, 0x7}, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x7, 0x7, r9, &(0x7f0000001c80)="00573e13f87f9e5bdd2abf1b871ae4be0eb01de41ff3d1b4c4505e36505226ea2ca81de9d0eb598b2c1802da7a8f49c9f06dbb8a3baf230294ffc4f9c0878b4946ed44753e0681108878c1b722ea8d8c8a0f132ad8ebaba922bc4465946851fc51bf51f8abb0d383dba465be82e2db8b2c3060ac8625f08629f3abc66c04e26ea8e943f30344", 0x86, 0x4, 0x0, 0x1}]) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c6e6f6ec9547461696c3d302c756e695f786c6174653d312c757466383d312c646973636172642c756e690700000074653d302c73686f72746e616d653d77696e6e742c757466383d312c00"], 0x3, 0x21e, &(0x7f00000006c0)="$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") perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1, 0x6, 0x3, 0xa2, 0x0, 0x2400000, 0x2400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2ec, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x8000, 0x1d3, 0x7, 0x2, 0x8000000000000001, 0x8, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffff7}, 0xffffffffffffffff, 0xd, r0, 0x2) [ 2933.260723][ T8844] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x0, 0x5]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:19 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x10}, 0x0) 07:46:19 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xc3ffffff00000000) 07:46:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x6c00}, 0x0) 07:46:19 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x25}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) 07:46:19 executing program 5: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0xf, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) 07:46:19 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x2, 0x21e, &(0x7f00000006c0)="$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") [ 2933.475479][ T8858] loop0: detected capacity change from 0 to 256 [ 2933.541887][ T8860] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:19 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x38b}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x7400}, 0x0) 07:46:19 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xeaffffff00000000) 07:46:19 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}], [], 0x51}, 0x3, 0x21e, &(0x7f00000006c0)="$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") 07:46:19 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x330a, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) [ 2934.108278][ T8868] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2934.117290][ T8868] 8021q: adding VLAN 0 to HW filter on device team0 [ 2934.127658][ T8871] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x0, 0x6]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:19 executing program 5: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x400300}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) 07:46:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x7a00}, 0x0) 07:46:19 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xf0ffffff00000000) 07:46:19 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x34000}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) 07:46:19 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xf30a000000000000) 07:46:19 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x60}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) [ 2934.407720][ T8887] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:20 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x398}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:20 executing program 5: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x1b}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) 07:46:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x8100}, 0x0) 07:46:20 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xfeffffff00000000) 07:46:20 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") (fail_nth: 1) [ 2934.919653][ T8891] validate_nla: 24 callbacks suppressed [ 2934.919687][ T8891] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2934.929698][ T8898] FAULT_INJECTION: forcing a failure. [ 2934.929698][ T8898] name failslab, interval 1, probability 0, space 0, times 0 [ 2934.946180][ T8898] CPU: 1 PID: 8898 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2934.956634][ T8898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2934.966720][ T8898] Call Trace: [ 2934.970085][ T8898] [ 2934.973025][ T8898] dump_stack_lvl+0xda/0x130 [ 2934.977704][ T8898] dump_stack+0x15/0x20 [ 2934.981871][ T8898] should_fail_ex+0x21f/0x230 [ 2934.986612][ T8898] ? __se_sys_memfd_create+0x1da/0x680 [ 2934.992091][ T8898] __should_failslab+0x92/0xa0 [ 2934.996941][ T8898] should_failslab+0x9/0x20 [ 2935.001522][ T8898] slab_pre_alloc_hook+0x38/0x180 [ 2935.006617][ T8898] ? __se_sys_memfd_create+0x1da/0x680 [ 2935.012123][ T8898] ? __se_sys_memfd_create+0x1da/0x680 [ 2935.017694][ T8898] __kmem_cache_alloc_node+0x48/0x1d0 [ 2935.023167][ T8898] ? __se_sys_memfd_create+0x1da/0x680 [ 2935.028705][ T8898] __kmalloc+0x95/0x1a0 [ 2935.032935][ T8898] __se_sys_memfd_create+0x1da/0x680 [ 2935.038310][ T8898] ? ksys_write+0x178/0x1a0 [ 2935.042902][ T8898] __x64_sys_memfd_create+0x31/0x40 [ 2935.048419][ T8898] do_syscall_64+0x41/0xc0 [ 2935.052850][ T8898] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2935.058764][ T8898] RIP: 0033:0x7fe800407b29 [ 2935.063192][ T8898] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2935.082816][ T8898] RSP: 002b:00007fe7ff789e98 EFLAGS: 00000206 ORIG_RAX: 000000000000013f [ 2935.091311][ T8898] RAX: ffffffffffffffda RBX: 000000000000021e RCX: 00007fe800407b29 [ 2935.099310][ T8898] RDX: 00007fe7ff789f3c RSI: 0000000000000000 RDI: 00007fe8004526ba [ 2935.107291][ T8898] RBP: 00000000200006c0 R08: 00007fe7ff789c37 R09: 00007fe7ff78a120 07:46:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x0, 0x7]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:20 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x3ac}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="700100004000000428bd7023d3c1d782382baf52874552e564d1fd6be83a96c46d8e9d84f5da53d168215bf55da9953773030000007412afc31a0ae0c18d371bdbe4a6a94ceed46f6d6bbb8187fd60a653f3f8611991a851e11c7398c05a493f8a4c3918abef059331f5d272b242fd5efd73daf765b6aede18a4606e9a66f074d7bfeb9500f5accd60c8000511893efc04a6ade861f2aacb0e14dc0774e93ada1b8e23bde2d614c638718470091e1ebbbc9c4873824e2500b4cdb645c1a18736ba837b7340ed1eea600cf98dbd67cdce160e560c1eaf19840531f50330d4763aca4c72e8b626efbfbda1846178b739dce19a39d3f7cbf59148eeee6cc43ba0027f79533a5ae7fc0ea443a33a0ed981ff10a9852789a66dfdffffffffffffff2d4c0147b27a17f3bcbfe6b1a77de106f56a1fdde125b885ca1b1a1ba2006cd76b088035f0dc8332b85c9a941dc893d1e3666e6aa349a745a7f240768cdbb7f74909d17ad1002d7a504310d905649babd929961f5f0df87cdba425e8de787d52113ea1e84b794b273ab231463a137124ef018d7ac65ad6142299f01d39cf566183f7312311bc3e0f4283493f0f4bd95dd3f05651f4869e325c9f0ae7c7ca96cb6623571771c25a5786d1dce1247ceb5ed6afe6076160c5de75a0a4c5a8842024b7aa2f37cf7dcc2ddeea1b12af226b2f13f5a1abc1f7d2d30f027d91904caf587f2f542ecd5c7ffcb4494cd54c4997a6f0dfe514a88457760d00005c2b03881c7bda801e777e6325f848aedb1179acca468265b70a25789f82469e15c6979156e0e3f68df4bbc7595c95c24f95f093f095de8f10ea7af766db127188bc0e91adc446d70eb3213f1a25a1619d6fc1b000811ad104f02a749b8ed8095d2e3feab3877b6f3c9ee9de00"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:20 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xffffff7f00000000) [ 2935.115347][ T8898] R10: 000000000000000a R11: 0000000000000206 R12: 0000000020000180 [ 2935.123329][ T8898] R13: 00007fe7ff789f3c R14: 00007fe7ff789f40 R15: 00000000200000c0 [ 2935.131313][ T8898] [ 2935.155213][ T8895] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:46:20 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$eJzs3bFqU1EcBvB/bNRakHQQiiJ4xcUptBX3FKkgBhQlg04W26I0tWChoENbJ19CX0FHV8FBXH0BEaQKLtapgxCpNyZNSWKkpreY32/pR+/5cs65Qy4ZcnLn9OLC7NLy/ObmRgwP5yJfilJs5WI0DsVQpNYDAPifbNVq8a2WynotAMD+8PwHgMHT7fmfW2/87/r+rwwA6Bef/wFg8Ny8dfvqVLk8fSNJhiMWn65UVirp3/T61Hzcj2rMxXgU4kdErSHNl6+Up8eTbZ9Ho7K4Vu+vrVSGWvsTUYjR9v2JJNXaPxwj9f6HkZiLySjEifb9ybb9I3H+3I75i1GI93djKaoxG9vdZn91IkkuXSvv6h/9NQ4AAAAAAAAAAAAAAAAAAAAAAPqhmDS0Pb+nWOx0Pe3vPB/oWNfzgXafz5OPU/ls9w4AAAAAAAAAAAAAAAAAAAAHxfKjxwsz1ercw27hwbsXb/40pseQq8+719fZezh+9tOzzmOe/M39+bfh9Zksb0uP4e3GvZMXlscudhoT+axX2Bq+FiL6NMXL36H0/SDstFMYe16aebX68UuvrQzflAAAAAAAAAAAAAAAAAAAYEA1v/Sb9UoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDvN3//vW1jPeo8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPAzAAD//4c6qcs=") (fail_nth: 2) 07:46:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x8847}, 0x0) [ 2935.178255][ T8893] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 2935.217964][ T8907] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:46:20 executing program 5: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x1b}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) [ 2935.224913][ T8909] FAULT_INJECTION: forcing a failure. [ 2935.224913][ T8909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2935.239257][ T8909] CPU: 0 PID: 8909 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2935.249641][ T8909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2935.259776][ T8909] Call Trace: [ 2935.263069][ T8909] [ 2935.266053][ T8909] dump_stack_lvl+0xda/0x130 [ 2935.270678][ T8909] dump_stack+0x15/0x20 [ 2935.274873][ T8909] should_fail_ex+0x21f/0x230 [ 2935.279645][ T8909] should_fail+0xb/0x10 [ 2935.283827][ T8909] should_fail_usercopy+0x1a/0x20 [ 2935.288917][ T8909] _copy_from_user+0x1e/0xd0 [ 2935.293547][ T8909] __se_sys_memfd_create+0x215/0x680 [ 2935.298866][ T8909] ? ksys_write+0x178/0x1a0 [ 2935.303419][ T8909] __x64_sys_memfd_create+0x31/0x40 [ 2935.308647][ T8909] do_syscall_64+0x41/0xc0 [ 2935.313092][ T8909] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2935.319095][ T8909] RIP: 0033:0x7fe800407b29 [ 2935.323529][ T8909] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2935.343216][ T8909] RSP: 002b:00007fe7ff789e98 EFLAGS: 00000206 ORIG_RAX: 000000000000013f [ 2935.351731][ T8909] RAX: ffffffffffffffda RBX: 000000000000021e RCX: 00007fe800407b29 [ 2935.359738][ T8909] RDX: 00007fe7ff789f3c RSI: 0000000000000000 RDI: 00007fe8004526ba [ 2935.367734][ T8909] RBP: 00000000200006c0 R08: 00007fe7ff789c37 R09: 00007fe7ff78a120 [ 2935.375900][ T8909] R10: 000000000000000a R11: 0000000000000206 R12: 0000000020000180 [ 2935.383890][ T8909] R13: 00007fe7ff789f3c R14: 00007fe7ff789f40 R15: 00000000200000c0 [ 2935.391881][ T8909] 07:46:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0x8848}, 0x0) [ 2935.441478][ T8906] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:46:21 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0xffffffff00000000) [ 2935.520422][ T8914] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 2935.550949][ T8916] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:46:21 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$eJzs3bFqU1EcBvB/bNRakHQQiiJ4xcUptBX3FKkgBhQlg04W26I0tWChoENbJ19CX0FHV8FBXH0BEaQKLtapgxCpNyZNSWKkpreY32/pR+/5cs65Qy4ZcnLn9OLC7NLy/ObmRgwP5yJfilJs5WI0DsVQpNYDAPifbNVq8a2WynotAMD+8PwHgMHT7fmfW2/87/r+rwwA6Bef/wFg8Ny8dfvqVLk8fSNJhiMWn65UVirp3/T61Hzcj2rMxXgU4kdErSHNl6+Up8eTbZ9Ho7K4Vu+vrVSGWvsTUYjR9v2JJNXaPxwj9f6HkZiLySjEifb9ybb9I3H+3I75i1GI93djKaoxG9vdZn91IkkuXSvv6h/9NQ4AAAAAAAAAAAAAAAAAAAAAAPqhmDS0Pb+nWOx0Pe3vPB/oWNfzgXafz5OPU/ls9w4AAAAAAAAAAAAAAAAAAAAHxfKjxwsz1ercw27hwbsXb/40pseQq8+719fZezh+9tOzzmOe/M39+bfh9Zksb0uP4e3GvZMXlscudhoT+axX2Bq+FiL6NMXL36H0/SDstFMYe16aebX68UuvrQzflAAAAAAAAAAAAAAAAAAAYEA1v/Sb9UoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDvN3//vW1jPeo8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPAzAAD//4c6qcs=") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) (fail_nth: 1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 07:46:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xaa3f}, 0x0) 07:46:21 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") (fail_nth: 3) [ 2935.644068][ T8918] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2935.674986][ T8923] FAULT_INJECTION: forcing a failure. [ 2935.674986][ T8923] name failslab, interval 1, probability 0, space 0, times 0 [ 2935.685404][ T8924] FAULT_INJECTION: forcing a failure. [ 2935.685404][ T8924] name failslab, interval 1, probability 0, space 0, times 0 [ 2935.687695][ T8923] CPU: 1 PID: 8923 Comm: syz-executor.5 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2935.710664][ T8923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2935.720741][ T8923] Call Trace: [ 2935.724036][ T8923] [ 2935.726972][ T8923] dump_stack_lvl+0xda/0x130 [ 2935.731580][ T8923] dump_stack+0x15/0x20 [ 2935.735845][ T8923] should_fail_ex+0x21f/0x230 [ 2935.740679][ T8923] __should_failslab+0x92/0xa0 [ 2935.745526][ T8923] should_failslab+0x9/0x20 [ 2935.750079][ T8923] slab_pre_alloc_hook+0x38/0x180 [ 2935.755202][ T8923] kmem_cache_alloc+0x52/0x220 [ 2935.760023][ T8923] ? vm_area_dup+0x2c/0x130 [ 2935.764554][ T8923] vm_area_dup+0x2c/0x130 [ 2935.768907][ T8923] __split_vma+0x107/0x420 [ 2935.773349][ T8923] do_vmi_align_munmap+0x270/0x770 [ 2935.778579][ T8923] do_vmi_munmap+0x1ea/0x230 [ 2935.783228][ T8923] mmap_region+0x53c/0x14d0 [ 2935.787741][ T8923] ? avc_has_perm+0xd4/0x150 [ 2935.792346][ T8923] ? security_mmap_addr+0x46/0x60 [ 2935.797413][ T8923] ? get_unmapped_area+0x250/0x280 [ 2935.802535][ T8923] do_mmap+0x69c/0xaa0 [ 2935.806614][ T8923] vm_mmap_pgoff+0x12f/0x240 [ 2935.811224][ T8923] ksys_mmap_pgoff+0x2b8/0x330 [ 2935.816038][ T8923] do_syscall_64+0x41/0xc0 [ 2935.820526][ T8923] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2935.826446][ T8923] RIP: 0033:0x7f09a9accb29 [ 2935.830898][ T8923] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2935.850518][ T8923] RSP: 002b:00007f09a8e4f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2935.859042][ T8923] RAX: ffffffffffffffda RBX: 00007f09a9bebf80 RCX: 00007f09a9accb29 [ 2935.867029][ T8923] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 0000000020000000 [ 2935.875109][ T8923] RBP: 00007f09a8e4f120 R08: 0000000000000004 R09: 0000000000000000 [ 2935.883091][ T8923] R10: 0000000000010012 R11: 0000000000000246 R12: 0000000000000001 [ 2935.891098][ T8923] R13: 000000000000000b R14: 00007f09a9bebf80 R15: 00007fff1ccf7fc8 [ 2935.899108][ T8923] [ 2935.902148][ T8924] CPU: 0 PID: 8924 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2935.912499][ T8924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2935.912570][ T8924] Call Trace: [ 2935.912578][ T8924] [ 2935.912584][ T8924] dump_stack_lvl+0xda/0x130 [ 2935.925927][ T8924] dump_stack+0x15/0x20 [ 2935.937638][ T8924] should_fail_ex+0x21f/0x230 [ 2935.942402][ T8924] __should_failslab+0x92/0xa0 [ 2935.947289][ T8924] should_failslab+0x9/0x20 [ 2935.951907][ T8924] slab_pre_alloc_hook+0x38/0x180 [ 2935.957059][ T8924] kmem_cache_alloc_lru+0x4e/0x220 [ 2935.962221][ T8924] ? shmem_alloc_inode+0x34/0x50 [ 2935.967208][ T8924] shmem_alloc_inode+0x34/0x50 [ 2935.972077][ T8924] ? shmem_match+0xa0/0xa0 [ 2935.976529][ T8924] alloc_inode+0x38/0x150 [ 2935.978712][ T8927] FAULT_INJECTION: forcing a failure. [ 2935.978712][ T8927] name failslab, interval 1, probability 0, space 0, times 0 [ 2935.980881][ T8924] new_inode+0x24/0x130 [ 2935.980933][ T8924] shmem_get_inode+0x228/0x760 [ 2935.980979][ T8924] __shmem_file_setup+0x122/0x1f0 [ 2935.981018][ T8924] shmem_file_setup+0x3b/0x50 [ 2936.012376][ T8924] __se_sys_memfd_create+0x301/0x680 [ 2936.017856][ T8924] ? ksys_write+0x178/0x1a0 [ 2936.022383][ T8924] __x64_sys_memfd_create+0x31/0x40 [ 2936.027646][ T8924] do_syscall_64+0x41/0xc0 [ 2936.032079][ T8924] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2936.037994][ T8924] RIP: 0033:0x7fe800407b29 [ 2936.042442][ T8924] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2936.062106][ T8924] RSP: 002b:00007fe7ff789e98 EFLAGS: 00000206 ORIG_RAX: 000000000000013f [ 2936.070689][ T8924] RAX: ffffffffffffffda RBX: 000000000000021e RCX: 00007fe800407b29 [ 2936.078711][ T8924] RDX: 00007fe7ff789f3c RSI: 0000000000000000 RDI: 00007fe8004526ba [ 2936.086773][ T8924] RBP: 00000000200006c0 R08: 00007fe7ff789c37 R09: 00007fe7ff78a120 07:46:21 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) (fail_nth: 2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 2936.094753][ T8924] R10: 000000000000000a R11: 0000000000000206 R12: 0000000020000180 [ 2936.102809][ T8924] R13: 00007fe7ff789f3c R14: 00007fe7ff789f40 R15: 00000000200000c0 [ 2936.110843][ T8924] [ 2936.113864][ T8927] CPU: 1 PID: 8927 Comm: syz-executor.5 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2936.124267][ T8927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2936.134357][ T8927] Call Trace: [ 2936.137662][ T8927] [ 2936.140617][ T8927] dump_stack_lvl+0xda/0x130 [ 2936.145251][ T8927] dump_stack+0x15/0x20 [ 2936.149505][ T8927] should_fail_ex+0x21f/0x230 [ 2936.154194][ T8927] __should_failslab+0x92/0xa0 [ 2936.158962][ T8927] should_failslab+0x9/0x20 [ 2936.163559][ T8927] slab_pre_alloc_hook+0x38/0x180 [ 2936.168683][ T8927] kmem_cache_alloc+0x52/0x220 [ 2936.173472][ T8927] ? vm_area_dup+0x98/0x130 [ 2936.178060][ T8927] vm_area_dup+0x98/0x130 [ 2936.182412][ T8927] __split_vma+0x107/0x420 [ 2936.186834][ T8927] do_vmi_align_munmap+0x270/0x770 [ 2936.192022][ T8927] do_vmi_munmap+0x1ea/0x230 [ 2936.196631][ T8927] mmap_region+0x53c/0x14d0 [ 2936.201219][ T8927] ? avc_has_perm+0xd4/0x150 [ 2936.205840][ T8927] ? security_mmap_addr+0x46/0x60 [ 2936.210882][ T8927] ? get_unmapped_area+0x250/0x280 [ 2936.216102][ T8927] do_mmap+0x69c/0xaa0 [ 2936.220224][ T8927] vm_mmap_pgoff+0x12f/0x240 [ 2936.224830][ T8927] ksys_mmap_pgoff+0x2b8/0x330 [ 2936.229696][ T8927] do_syscall_64+0x41/0xc0 [ 2936.234121][ T8927] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2936.240057][ T8927] RIP: 0033:0x7f09a9accb29 [ 2936.244563][ T8927] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2936.264199][ T8927] RSP: 002b:00007f09a8e4f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2936.272621][ T8927] RAX: ffffffffffffffda RBX: 00007f09a9bebf80 RCX: 00007f09a9accb29 [ 2936.280658][ T8927] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 0000000020000000 [ 2936.288750][ T8927] RBP: 00007f09a8e4f120 R08: 0000000000000004 R09: 0000000000000000 07:46:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:21 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$eJzs3bFqU1EcBvB/bNRakHQQiiJ4xcUptBX3FKkgBhQlg04W26I0tWChoENbJ19CX0FHV8FBXH0BEaQKLtapgxCpNyZNSWKkpreY32/pR+/5cs65Qy4ZcnLn9OLC7NLy/ObmRgwP5yJfilJs5WI0DsVQpNYDAPifbNVq8a2WynotAMD+8PwHgMHT7fmfW2/87/r+rwwA6Bef/wFg8Ny8dfvqVLk8fSNJhiMWn65UVirp3/T61Hzcj2rMxXgU4kdErSHNl6+Up8eTbZ9Ho7K4Vu+vrVSGWvsTUYjR9v2JJNXaPxwj9f6HkZiLySjEifb9ybb9I3H+3I75i1GI93djKaoxG9vdZn91IkkuXSvv6h/9NQ4AAAAAAAAAAAAAAAAAAAAAAPqhmDS0Pb+nWOx0Pe3vPB/oWNfzgXafz5OPU/ls9w4AAAAAAAAAAAAAAAAAAAAHxfKjxwsz1ercw27hwbsXb/40pseQq8+719fZezh+9tOzzmOe/M39+bfh9Zksb0uP4e3GvZMXlscudhoT+axX2Bq+FiL6NMXL36H0/SDstFMYe16aebX68UuvrQzflAAAAAAAAAAAAAAAAAAAYEA1v/Sb9UoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDvN3//vW1jPeo8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPAzAAD//4c6qcs=") (fail_nth: 4) 07:46:21 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x3bc}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2936.296724][ T8927] R10: 0000000000010012 R11: 0000000000000246 R12: 0000000000000001 [ 2936.304763][ T8927] R13: 000000000000000b R14: 00007f09a9bebf80 R15: 00007fff1ccf7fc8 [ 2936.312817][ T8927] [ 2936.333415][ T8922] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:46:22 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r4) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r6 = openat$cgroup_procs(r5, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r6, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0x5729, 0x40, 0x6}) r9 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r9, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) write$binfmt_misc(r9, &(0x7f00000000c0)=ANY=[@ANYRES32=r9], 0xfff7) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x170}], 0x1, &(0x7f0000000d80)=ANY=[@ANYBLOB="1c000000000000000100000001000000cec456146cc68957c89e67f1e9517b51b449d946bfab07dc18f53a5225e53ccc55f3a209790fe729ead14f011661955738211453b19479a9303295359c754951d7f5d141ff3f652f950f8cd9b009b831989938486410bf253c06975141e03f96a2ebb8052d", @ANYRES64, @ANYRES32, @ANYRESDEC, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES8=r7, @ANYRES32=r10, @ANYRES16, @ANYRES16=r3, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES8], 0x68, 0x1}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)=@deltclass={0xb8, 0x29, 0x2, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xa, 0xffe7}, {0xffe0, 0xfff1}, {0xfff1, 0x4}}, [@TCA_RATE={0x6, 0x5, {0x7, 0x99}}, @tclass_kind_options=@c_red={0x8}, @TCA_RATE={0x6, 0x5, {0x4, 0xff}}, @tclass_kind_options=@c_atm={{0x8}, {0x3c, 0x2, [@TCA_ATM_HDR={0x2d, 0x3, "21631207c525b01d86f7102260846739cf0c9c8faa130eab0a6438f842fd78ef9e29a771828ad52fcd"}, @TCA_ATM_EXCESS={0x8, 0x4, {0x1, 0xf}}]}}, @tclass_kind_options=@c_hfsc={{0x9}, {0x14, 0x2, [@TCA_HFSC_USC={0x10, 0x3, {0x40, 0xbd, 0x9}}]}}, @tclass_kind_options=@c_dsmark={{0xb}, {0xc, 0x2, @TCA_DSMARK_VALUE={0x5, 0x5, 0x1}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)=@random={'os2.', '(/]*\x00'}, &(0x7f0000000a00)='!\\\x00', 0x3, 0x0) [ 2936.349386][ T8930] FAULT_INJECTION: forcing a failure. [ 2936.349386][ T8930] name failslab, interval 1, probability 0, space 0, times 0 [ 2936.362402][ T8930] CPU: 1 PID: 8930 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2936.372798][ T8930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2936.382967][ T8930] Call Trace: [ 2936.386315][ T8930] [ 2936.389277][ T8930] dump_stack_lvl+0xda/0x130 [ 2936.393996][ T8930] dump_stack+0x15/0x20 07:46:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) (fail_nth: 3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 2936.398196][ T8930] should_fail_ex+0x21f/0x230 [ 2936.402986][ T8930] __should_failslab+0x92/0xa0 [ 2936.407822][ T8930] should_failslab+0x9/0x20 [ 2936.412367][ T8930] slab_pre_alloc_hook+0x38/0x180 [ 2936.417440][ T8930] kmem_cache_alloc+0x52/0x220 [ 2936.422402][ T8930] ? security_inode_alloc+0x32/0xd0 [ 2936.424897][ T8937] FAULT_INJECTION: forcing a failure. [ 2936.424897][ T8937] name failslab, interval 1, probability 0, space 0, times 0 [ 2936.427635][ T8930] security_inode_alloc+0x32/0xd0 [ 2936.445383][ T8930] inode_init_always+0x3ff/0x440 [ 2936.450369][ T8930] ? shmem_match+0xa0/0xa0 [ 2936.454896][ T8930] alloc_inode+0x77/0x150 [ 2936.459335][ T8930] new_inode+0x24/0x130 [ 2936.463567][ T8930] shmem_get_inode+0x228/0x760 [ 2936.468419][ T8930] __shmem_file_setup+0x122/0x1f0 [ 2936.473512][ T8930] shmem_file_setup+0x3b/0x50 [ 2936.478412][ T8930] __se_sys_memfd_create+0x301/0x680 [ 2936.483720][ T8930] ? ksys_write+0x178/0x1a0 [ 2936.488309][ T8930] __x64_sys_memfd_create+0x31/0x40 [ 2936.493545][ T8930] do_syscall_64+0x41/0xc0 [ 2936.497983][ T8930] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2936.503898][ T8930] RIP: 0033:0x7fe800407b29 [ 2936.508321][ T8930] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2936.527943][ T8930] RSP: 002b:00007fe7ff789e98 EFLAGS: 00000206 ORIG_RAX: 000000000000013f [ 2936.536369][ T8930] RAX: ffffffffffffffda RBX: 000000000000021e RCX: 00007fe800407b29 [ 2936.544351][ T8930] RDX: 00007fe7ff789f3c RSI: 0000000000000000 RDI: 00007fe8004526ba [ 2936.552407][ T8930] RBP: 00000000200006c0 R08: 00007fe7ff789c37 R09: 00007fe7ff78a120 [ 2936.560387][ T8930] R10: 000000000000000a R11: 0000000000000206 R12: 0000000020000180 [ 2936.568367][ T8930] R13: 00007fe7ff789f3c R14: 00007fe7ff789f40 R15: 00000000200000c0 [ 2936.576390][ T8930] [ 2936.579417][ T8937] CPU: 0 PID: 8937 Comm: syz-executor.5 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2936.589846][ T8937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2936.599984][ T8937] Call Trace: [ 2936.603295][ T8937] [ 2936.606264][ T8937] dump_stack_lvl+0xda/0x130 [ 2936.610912][ T8937] dump_stack+0x15/0x20 [ 2936.614838][ T8942] FAULT_INJECTION: forcing a failure. [ 2936.614838][ T8942] name failslab, interval 1, probability 0, space 0, times 0 [ 2936.615139][ T8937] should_fail_ex+0x21f/0x230 [ 2936.632474][ T8937] __should_failslab+0x92/0xa0 [ 2936.637349][ T8937] should_failslab+0x9/0x20 [ 2936.641938][ T8937] slab_pre_alloc_hook+0x38/0x180 [ 2936.647077][ T8937] kmem_cache_alloc+0x52/0x220 [ 2936.651980][ T8937] ? mas_alloc_nodes+0x1e2/0x490 [ 2936.656952][ T8937] mas_alloc_nodes+0x1e2/0x490 [ 2936.661899][ T8937] ? kmem_cache_alloc+0x10f/0x220 [ 2936.666984][ T8937] mas_preallocate+0xb8/0x1e0 [ 2936.671696][ T8937] __split_vma+0x11c/0x420 [ 2936.676214][ T8937] do_vmi_align_munmap+0x270/0x770 [ 2936.681416][ T8937] do_vmi_munmap+0x1ea/0x230 [ 2936.686018][ T8937] mmap_region+0x53c/0x14d0 [ 2936.690607][ T8937] ? avc_has_perm+0xd4/0x150 [ 2936.695218][ T8937] ? security_mmap_addr+0x46/0x60 [ 2936.700258][ T8937] ? get_unmapped_area+0x250/0x280 [ 2936.705411][ T8937] do_mmap+0x69c/0xaa0 [ 2936.709488][ T8937] vm_mmap_pgoff+0x12f/0x240 [ 2936.714096][ T8937] ksys_mmap_pgoff+0x2b8/0x330 [ 2936.718880][ T8937] do_syscall_64+0x41/0xc0 [ 2936.723431][ T8937] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2936.729346][ T8937] RIP: 0033:0x7f09a9accb29 [ 2936.733766][ T8937] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2936.753392][ T8937] RSP: 002b:00007f09a8e4f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2936.761908][ T8937] RAX: ffffffffffffffda RBX: 00007f09a9bebf80 RCX: 00007f09a9accb29 [ 2936.769887][ T8937] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 0000000020000000 [ 2936.777943][ T8937] RBP: 00007f09a8e4f120 R08: 0000000000000004 R09: 0000000000000000 [ 2936.785950][ T8937] R10: 0000000000010012 R11: 0000000000000246 R12: 0000000000000001 [ 2936.793928][ T8937] R13: 000000000000000b R14: 00007f09a9bebf80 R15: 00007fff1ccf7fc8 07:46:22 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") (fail_nth: 5) 07:46:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) (fail_nth: 4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 2936.801938][ T8937] [ 2936.805034][ T8942] CPU: 1 PID: 8942 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2936.815469][ T8942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2936.825529][ T8942] Call Trace: [ 2936.825595][ T8942] [ 2936.825605][ T8942] dump_stack_lvl+0xda/0x130 [ 2936.836443][ T8942] dump_stack+0x15/0x20 [ 2936.840640][ T8942] should_fail_ex+0x21f/0x230 [ 2936.845358][ T8942] __should_failslab+0x92/0xa0 [ 2936.850223][ T8942] should_failslab+0x9/0x20 [ 2936.854777][ T8942] slab_pre_alloc_hook+0x38/0x180 [ 2936.859902][ T8942] kmem_cache_alloc_lru+0x4e/0x220 [ 2936.865114][ T8942] ? __d_alloc+0x3d/0x380 [ 2936.869525][ T8942] ? get_random_u32+0x1b6/0x260 [ 2936.874414][ T8942] __d_alloc+0x3d/0x380 [ 2936.878589][ T8942] ? current_time+0x103/0x1d0 [ 2936.883291][ T8942] d_alloc_pseudo+0x1e/0x50 [ 2936.887874][ T8942] alloc_file_pseudo+0x74/0x160 [ 2936.892736][ T8942] __shmem_file_setup+0x16e/0x1f0 [ 2936.897776][ T8942] shmem_file_setup+0x3b/0x50 [ 2936.902468][ T8942] __se_sys_memfd_create+0x301/0x680 [ 2936.907830][ T8942] ? ksys_write+0x178/0x1a0 [ 2936.912369][ T8942] __x64_sys_memfd_create+0x31/0x40 [ 2936.917607][ T8942] do_syscall_64+0x41/0xc0 [ 2936.922133][ T8942] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2936.928065][ T8942] RIP: 0033:0x7fe800407b29 [ 2936.932571][ T8942] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2936.952222][ T8942] RSP: 002b:00007fe7ff789e98 EFLAGS: 00000206 ORIG_RAX: 000000000000013f [ 2936.960652][ T8942] RAX: ffffffffffffffda RBX: 000000000000021e RCX: 00007fe800407b29 [ 2936.968635][ T8942] RDX: 00007fe7ff789f3c RSI: 0000000000000000 RDI: 00007fe8004526ba [ 2936.977030][ T8942] RBP: 00000000200006c0 R08: 00007fe7ff789c37 R09: 00007fe7ff78a120 [ 2936.985010][ T8942] R10: 000000000000000a R11: 0000000000000206 R12: 0000000020000180 [ 2936.993035][ T8942] R13: 00007fe7ff789f3c R14: 00007fe7ff789f40 R15: 00000000200000c0 [ 2937.001021][ T8942] [ 2937.004183][ T8944] xt_ct_set_helper: 3 callbacks suppressed [ 2937.004218][ T8944] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2937.025678][ T8922] net_ratelimit: 17 callbacks suppressed [ 2937.025692][ T8922] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:22 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") (fail_nth: 6) 07:46:22 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x3c8}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2937.062238][ T8935] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 2937.077268][ T8945] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xacad}, 0x0) [ 2937.158356][ T8952] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2937.190053][ T8953] FAULT_INJECTION: forcing a failure. [ 2937.190053][ T8953] name failslab, interval 1, probability 0, space 0, times 0 [ 2937.203046][ T8953] CPU: 0 PID: 8953 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2937.213430][ T8953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2937.223618][ T8953] Call Trace: [ 2937.226923][ T8953] [ 2937.229868][ T8953] dump_stack_lvl+0xda/0x130 [ 2937.234488][ T8953] dump_stack+0x15/0x20 [ 2937.238676][ T8953] should_fail_ex+0x21f/0x230 [ 2937.243434][ T8953] __should_failslab+0x92/0xa0 [ 2937.248309][ T8953] should_failslab+0x9/0x20 [ 2937.252839][ T8953] slab_pre_alloc_hook+0x38/0x180 [ 2937.257972][ T8953] kmem_cache_alloc+0x52/0x220 [ 2937.262797][ T8953] ? alloc_empty_file+0xd0/0x310 [ 2937.267756][ T8953] alloc_empty_file+0xd0/0x310 [ 2937.272548][ T8953] alloc_file+0x3a/0x300 [ 2937.276823][ T8953] alloc_file_pseudo+0x103/0x160 [ 2937.281914][ T8953] __shmem_file_setup+0x16e/0x1f0 [ 2937.286987][ T8953] shmem_file_setup+0x3b/0x50 [ 2937.291732][ T8953] __se_sys_memfd_create+0x301/0x680 [ 2937.297047][ T8953] ? ksys_write+0x178/0x1a0 [ 2937.301584][ T8953] __x64_sys_memfd_create+0x31/0x40 [ 2937.306939][ T8953] do_syscall_64+0x41/0xc0 [ 2937.311387][ T8953] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2937.317377][ T8953] RIP: 0033:0x7fe800407b29 [ 2937.321850][ T8953] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2937.329752][ T8950] FAULT_INJECTION: forcing a failure. [ 2937.329752][ T8950] name failslab, interval 1, probability 0, space 0, times 0 [ 2937.341471][ T8953] RSP: 002b:00007fe7ff789e98 EFLAGS: 00000206 ORIG_RAX: 000000000000013f [ 2937.341554][ T8953] RAX: ffffffffffffffda RBX: 000000000000021e RCX: 00007fe800407b29 [ 2937.341569][ T8953] RDX: 00007fe7ff789f3c RSI: 0000000000000000 RDI: 00007fe8004526ba [ 2937.341584][ T8953] RBP: 00000000200006c0 R08: 00007fe7ff789c37 R09: 00007fe7ff78a120 [ 2937.386589][ T8953] R10: 000000000000000a R11: 0000000000000206 R12: 0000000020000180 [ 2937.394582][ T8953] R13: 00007fe7ff789f3c R14: 00007fe7ff789f40 R15: 00000000200000c0 [ 2937.402625][ T8953] [ 2937.405653][ T8950] CPU: 1 PID: 8950 Comm: syz-executor.5 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2937.416086][ T8950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2937.426183][ T8950] Call Trace: [ 2937.429482][ T8950] [ 2937.432440][ T8950] dump_stack_lvl+0xda/0x130 [ 2937.437068][ T8950] dump_stack+0x15/0x20 [ 2937.441249][ T8950] should_fail_ex+0x21f/0x230 [ 2937.441355][ T8950] __should_failslab+0x92/0xa0 [ 2937.441427][ T8935] ================================================================== [ 2937.441462][ T8935] BUG: KCSAN: data-race in data_push_tail / symbol_string [ 2937.441417][ T8950] should_failslab+0x9/0x20 [ 2937.441509][ T8935] [ 2937.441507][ T8950] slab_pre_alloc_hook+0x38/0x180 [ 2937.441517][ T8935] write to 0xffffffff86f4c919 of 1 bytes by task 8950 on cpu 1: [ 2937.441541][ T8935] symbol_string+0x1b6/0x240 [ 2937.441551][ T8950] kmem_cache_alloc_bulk+0x4f/0x280 [ 2937.441572][ T8935] pointer+0x77a/0xd10 [ 2937.441598][ T8935] vsnprintf+0x861/0xe20 07:46:23 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$eJzs3bFqU1EcBvB/bNRakHQQiiJ4xcUptBX3FKkgBhQlg04W26I0tWChoENbJ19CX0FHV8FBXH0BEaQKLtapgxCpNyZNSWKkpreY32/pR+/5cs65Qy4ZcnLn9OLC7NLy/ObmRgwP5yJfilJs5WI0DsVQpNYDAPifbNVq8a2WynotAMD+8PwHgMHT7fmfW2/87/r+rwwA6Bef/wFg8Ny8dfvqVLk8fSNJhiMWn65UVirp3/T61Hzcj2rMxXgU4kdErSHNl6+Up8eTbZ9Ho7K4Vu+vrVSGWvsTUYjR9v2JJNXaPxwj9f6HkZiLySjEifb9ybb9I3H+3I75i1GI93djKaoxG9vdZn91IkkuXSvv6h/9NQ4AAAAAAAAAAAAAAAAAAAAAAPqhmDS0Pb+nWOx0Pe3vPB/oWNfzgXafz5OPU/ls9w4AAAAAAAAAAAAAAAAAAAAHxfKjxwsz1ercw27hwbsXb/40pseQq8+719fZezh+9tOzzmOe/M39+bfh9Zksb0uP4e3GvZMXlscudhoT+axX2Bq+FiL6NMXL36H0/SDstFMYe16aebX68UuvrQzflAAAAAAAAAAAAAAAAAAAYEA1v/Sb9UoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDvN3//vW1jPeo8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPAzAAD//4c6qcs=") (fail_nth: 7) 07:46:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x0, 0x9]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:23 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) (fail_nth: 5) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 07:46:23 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$eJzs3bFqU1EcBvB/bNRakHQQiiJ4xcUptBX3FKkgBhQlg04W26I0tWChoENbJ19CX0FHV8FBXH0BEaQKLtapgxCpNyZNSWKkpreY32/pR+/5cs65Qy4ZcnLn9OLC7NLy/ObmRgwP5yJfilJs5WI0DsVQpNYDAPifbNVq8a2WynotAMD+8PwHgMHT7fmfW2/87/r+rwwA6Bef/wFg8Ny8dfvqVLk8fSNJhiMWn65UVirp3/T61Hzcj2rMxXgU4kdErSHNl6+Up8eTbZ9Ho7K4Vu+vrVSGWvsTUYjR9v2JJNXaPxwj9f6HkZiLySjEifb9ybb9I3H+3I75i1GI93djKaoxG9vdZn91IkkuXSvv6h/9NQ4AAAAAAAAAAAAAAAAAAAAAAPqhmDS0Pb+nWOx0Pe3vPB/oWNfzgXafz5OPU/ls9w4AAAAAAAAAAAAAAAAAAAAHxfKjxwsz1ercw27hwbsXb/40pseQq8+719fZezh+9tOzzmOe/M39+bfh9Zksb0uP4e3GvZMXlscudhoT+axX2Bq+FiL6NMXL36H0/SDstFMYe16aebX68UuvrQzflAAAAAAAAAAAAAAAAAAAYEA1v/Sb9UoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDvN3//vW1jPeo8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPAzAAD//4c6qcs=") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) (fail_nth: 6) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 2937.441592][ T8950] ? mas_alloc_nodes+0x1e2/0x490 [ 2937.441627][ T8935] vscnprintf+0x42/0x80 [ 2937.441651][ T8950] mas_alloc_nodes+0x2bb/0x490 [ 2937.441654][ T8935] printk_sprint+0x30/0x2d0 [ 2937.441686][ T8935] vprintk_store+0x56f/0x800 [ 2937.441689][ T8950] mas_preallocate+0xb8/0x1e0 [ 2937.441719][ T8935] vprintk_emit+0xd0/0x430 [ 2937.441747][ T8935] vprintk_default+0x26/0x30 [ 2937.441767][ T8950] __split_vma+0x11c/0x420 [ 2937.441779][ T8935] vprintk+0x83/0x90 [ 2937.441798][ T8950] do_vmi_align_munmap+0x270/0x770 07:46:23 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) (fail_nth: 7) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 2937.441814][ T8935] _printk+0x7a/0xa0 [ 2937.441852][ T8950] do_vmi_munmap+0x1ea/0x230 [ 2937.441856][ T8935] show_trace_log_lvl+0x37e/0x400 [ 2937.441883][ T8950] mmap_region+0x53c/0x14d0 [ 2937.441895][ T8935] dump_stack_lvl+0xda/0x130 [ 2937.441924][ T8935] dump_stack+0x15/0x20 [ 2937.441947][ T8935] should_fail_ex+0x21f/0x230 [ 2937.441967][ T8935] __should_failslab+0x92/0xa0 [ 2937.441910][ T8950] ? avc_has_perm+0xd4/0x150 [ 2937.441988][ T8935] should_failslab+0x9/0x20 [ 2937.442020][ T8950] ? security_mmap_addr+0x46/0x60 [ 2937.442020][ T8935] slab_pre_alloc_hook+0x38/0x180 [ 2937.442054][ T8950] ? get_unmapped_area+0x250/0x280 [ 2937.442057][ T8935] kmem_cache_alloc_bulk+0x4f/0x280 [ 2937.442084][ T8950] do_mmap+0x69c/0xaa0 [ 2937.442096][ T8935] mas_alloc_nodes+0x2bb/0x490 [ 2937.442117][ T8950] vm_mmap_pgoff+0x12f/0x240 [ 2937.442129][ T8935] mas_preallocate+0xb8/0x1e0 [ 2937.442157][ T8935] __split_vma+0x11c/0x420 [ 2937.442177][ T8935] do_vmi_align_munmap+0x270/0x770 [ 2937.442199][ T8935] do_vmi_munmap+0x1ea/0x230 [ 2937.442211][ T8950] ksys_mmap_pgoff+0x2b8/0x330 [ 2937.442224][ T8935] mmap_region+0x53c/0x14d0 [ 2937.442240][ T8950] do_syscall_64+0x41/0xc0 [ 2937.442247][ T8935] do_mmap+0x69c/0xaa0 [ 2937.442269][ T8935] vm_mmap_pgoff+0x12f/0x240 [ 2937.442274][ T8950] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2937.442301][ T8935] ksys_mmap_pgoff+0x2b8/0x330 [ 2937.442315][ T8950] RIP: 0033:0x7f09a9accb29 [ 2937.442325][ T8935] do_syscall_64+0x41/0xc0 [ 2937.442351][ T8935] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2937.442384][ T8935] [ 2937.442380][ T8950] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2937.442393][ T8935] read to 0xffffffff86f4c918 of 8 bytes by task 8935 on cpu 0: [ 2937.442407][ T8950] RSP: 002b:00007f09a8e4f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2937.442415][ T8935] data_push_tail+0x102/0x430 [ 2937.442437][ T8950] RAX: ffffffffffffffda RBX: 00007f09a9bebf80 RCX: 00007f09a9accb29 [ 2937.442454][ T8950] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 0000000020000000 [ 2937.442456][ T8935] data_alloc+0xbe/0x2c0 [ 2937.442473][ T8950] RBP: 00007f09a8e4f120 R08: 0000000000000004 R09: 0000000000000000 [ 2937.442490][ T8935] prb_reserve+0x893/0xbc0 [ 2937.442509][ T8950] R10: 0000000000010012 R11: 0000000000000246 R12: 0000000000000001 [ 2937.442525][ T8950] R13: 000000000000000b R14: 00007f09a9bebf80 R15: 00007fff1ccf7fc8 [ 2937.442526][ T8935] vprintk_store+0x53e/0x800 [ 2937.442548][ T8950] [ 2937.442558][ T8935] vprintk_emit+0xd0/0x430 [ 2937.442589][ T8935] vprintk_default+0x26/0x30 [ 2937.442645][ T8935] vprintk+0x83/0x90 [ 2937.442678][ T8935] _printk+0x7a/0xa0 [ 2937.442696][ T8935] caif_disconnect_client+0x133/0x140 [ 2937.442812][ T8935] chnl_net_open+0x50b/0x5b0 [ 2937.442838][ T8935] __dev_open+0x281/0x3a0 [ 2937.442875][ T8935] __dev_change_flags+0x159/0x400 [ 2937.442902][ T8935] dev_change_flags+0x59/0xd0 [ 2937.442929][ T8935] do_setlink+0x9f6/0x2430 [ 2937.442961][ T8935] rtnl_newlink+0xb98/0x1600 [ 2937.442989][ T8935] rtnetlink_rcv_msg+0x807/0x8c0 [ 2937.443024][ T8935] netlink_rcv_skb+0x126/0x220 [ 2937.443058][ T8935] rtnetlink_rcv+0x1c/0x20 [ 2937.443092][ T8935] netlink_unicast+0x56f/0x640 [ 2937.443120][ T8935] netlink_sendmsg+0x665/0x770 [ 2937.443151][ T8935] ____sys_sendmsg+0x37c/0x4d0 [ 2937.443188][ T8935] __sys_sendmsg+0x1e9/0x270 [ 2937.443224][ T8935] __x64_sys_sendmsg+0x46/0x50 [ 2937.443259][ T8935] do_syscall_64+0x41/0xc0 [ 2937.443286][ T8935] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2937.443318][ T8935] [ 2937.443323][ T8935] value changed: 0x000000010000b996 -> 0x5f646c756f687320 [ 2937.443335][ T8935] [ 2937.443339][ T8935] Reported by Kernel Concurrency Sanitizer on: [ 2937.443348][ T8935] CPU: 0 PID: 8935 Comm: syz-executor.4 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2937.443373][ T8935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2937.443390][ T8935] ================================================================== [ 2937.502276][ T8959] FAULT_INJECTION: forcing a failure. [ 2937.502276][ T8959] name failslab, interval 1, probability 0, space 0, times 0 [ 2937.627716][ T8965] FAULT_INJECTION: forcing a failure. [ 2937.627716][ T8965] name failslab, interval 1, probability 0, space 0, times 0 [ 2937.627812][ T8959] CPU: 1 PID: 8959 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2937.982723][ T8959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2937.992787][ T8959] Call Trace: [ 2937.996119][ T8959] [ 2937.999072][ T8959] dump_stack_lvl+0xda/0x130 [ 2938.003679][ T8959] dump_stack+0x15/0x20 [ 2938.007887][ T8959] should_fail_ex+0x21f/0x230 [ 2938.012615][ T8959] __should_failslab+0x92/0xa0 [ 2938.017410][ T8959] should_failslab+0x9/0x20 [ 2938.021945][ T8959] slab_pre_alloc_hook+0x38/0x180 [ 2938.027073][ T8959] kmem_cache_alloc+0x52/0x220 [ 2938.031960][ T8959] ? security_file_alloc+0x32/0xd0 [ 2938.037098][ T8959] ? kmem_cache_alloc+0x10f/0x220 [ 2938.042147][ T8959] security_file_alloc+0x32/0xd0 [ 2938.047155][ T8959] alloc_empty_file+0x120/0x310 [ 2938.052016][ T8959] alloc_file+0x3a/0x300 [ 2938.056344][ T8959] alloc_file_pseudo+0x103/0x160 [ 2938.061440][ T8959] __shmem_file_setup+0x16e/0x1f0 [ 2938.066500][ T8959] shmem_file_setup+0x3b/0x50 [ 2938.071206][ T8959] __se_sys_memfd_create+0x301/0x680 [ 2938.076625][ T8959] ? ksys_write+0x178/0x1a0 [ 2938.081157][ T8959] __x64_sys_memfd_create+0x31/0x40 [ 2938.086415][ T8959] do_syscall_64+0x41/0xc0 [ 2938.090904][ T8959] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2938.096820][ T8959] RIP: 0033:0x7fe800407b29 [ 2938.101242][ T8959] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2938.120874][ T8959] RSP: 002b:00007fe7ff789e98 EFLAGS: 00000206 ORIG_RAX: 000000000000013f [ 2938.129320][ T8959] RAX: ffffffffffffffda RBX: 000000000000021e RCX: 00007fe800407b29 [ 2938.137302][ T8959] RDX: 00007fe7ff789f3c RSI: 0000000000000000 RDI: 00007fe8004526ba [ 2938.145314][ T8959] RBP: 00000000200006c0 R08: 00007fe7ff789c37 R09: 00007fe7ff78a120 [ 2938.153537][ T8959] R10: 000000000000000a R11: 0000000000000206 R12: 0000000020000180 [ 2938.161517][ T8959] R13: 00007fe7ff789f3c R14: 00007fe7ff789f40 R15: 00000000200000c0 [ 2938.169506][ T8959] [ 2938.172546][ T8965] CPU: 0 PID: 8965 Comm: syz-executor.5 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2938.182945][ T8965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2938.193062][ T8965] Call Trace: [ 2938.196350][ T8965] [ 2938.199298][ T8965] dump_stack_lvl+0xda/0x130 [ 2938.203985][ T8965] dump_stack+0x15/0x20 [ 2938.208181][ T8965] should_fail_ex+0x21f/0x230 [ 2938.212949][ T8965] __should_failslab+0x92/0xa0 [ 2938.217786][ T8965] should_failslab+0x9/0x20 [ 2938.222341][ T8965] slab_pre_alloc_hook+0x38/0x180 [ 2938.227505][ T8965] kmem_cache_alloc+0x52/0x220 [ 2938.232306][ T8965] ? vm_area_alloc+0x2c/0x130 [ 2938.237056][ T8965] vm_area_alloc+0x2c/0x130 [ 2938.241583][ T8965] mmap_region+0x711/0x14d0 [ 2938.246183][ T8965] ? security_mmap_addr+0x46/0x60 [ 2938.251298][ T8965] ? get_unmapped_area+0x250/0x280 [ 2938.256431][ T8965] do_mmap+0x69c/0xaa0 [ 2938.260515][ T8965] vm_mmap_pgoff+0x12f/0x240 [ 2938.265126][ T8965] ksys_mmap_pgoff+0x2b8/0x330 [ 2938.269992][ T8965] do_syscall_64+0x41/0xc0 [ 2938.274487][ T8965] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2938.280469][ T8965] RIP: 0033:0x7f09a9accb29 [ 2938.284889][ T8965] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2938.304564][ T8965] RSP: 002b:00007f09a8e4f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2938.313017][ T8965] RAX: ffffffffffffffda RBX: 00007f09a9bebf80 RCX: 00007f09a9accb29 [ 2938.321036][ T8965] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 0000000020000000 [ 2938.329065][ T8965] RBP: 00007f09a8e4f120 R08: 0000000000000004 R09: 0000000000000000 [ 2938.337134][ T8965] R10: 0000000000010012 R11: 0000000000000246 R12: 0000000000000001 [ 2938.345112][ T8965] R13: 000000000000000b R14: 00007f09a9bebf80 R15: 00007fff1ccf7fc8 [ 2938.353095][ T8965] 07:46:24 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) (async) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r4) (async, rerun: 32) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async, rerun: 32) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) (async) r6 = openat$cgroup_procs(r5, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r6, &(0x7f00000001c0)=[{0x0}], 0x1) (async) prlimit64(0x0, 0x0, 0x0, 0x0) (async) r7 = socket$netlink(0x10, 0x3, 0x0) (async) r8 = socket$netlink(0x10, 0x3, 0x0) (async) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) (async, rerun: 64) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0x5729, 0x40, 0x6}) (rerun: 64) r9 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r9, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) (async, rerun: 64) write$binfmt_misc(r9, &(0x7f00000000c0)=ANY=[@ANYRES32=r9], 0xfff7) (rerun: 64) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x170}], 0x1, &(0x7f0000000d80)=ANY=[@ANYBLOB="1c000000000000000100000001000000cec456146cc68957c89e67f1e9517b51b449d946bfab07dc18f53a5225e53ccc55f3a209790fe729ead14f011661955738211453b19479a9303295359c754951d7f5d141ff3f652f950f8cd9b009b831989938486410bf253c06975141e03f96a2ebb8052d", @ANYRES64, @ANYRES32, @ANYRESDEC, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES8=r7, @ANYRES32=r10, @ANYRES16, @ANYRES16=r3, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES8], 0x68, 0x1}, 0x20008004) (async, rerun: 32) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) (rerun: 32) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)=@deltclass={0xb8, 0x29, 0x2, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xa, 0xffe7}, {0xffe0, 0xfff1}, {0xfff1, 0x4}}, [@TCA_RATE={0x6, 0x5, {0x7, 0x99}}, @tclass_kind_options=@c_red={0x8}, @TCA_RATE={0x6, 0x5, {0x4, 0xff}}, @tclass_kind_options=@c_atm={{0x8}, {0x3c, 0x2, [@TCA_ATM_HDR={0x2d, 0x3, "21631207c525b01d86f7102260846739cf0c9c8faa130eab0a6438f842fd78ef9e29a771828ad52fcd"}, @TCA_ATM_EXCESS={0x8, 0x4, {0x1, 0xf}}]}}, @tclass_kind_options=@c_hfsc={{0x9}, {0x14, 0x2, [@TCA_HFSC_USC={0x10, 0x3, {0x40, 0xbd, 0x9}}]}}, @tclass_kind_options=@c_dsmark={{0xb}, {0xc, 0x2, @TCA_DSMARK_VALUE={0x5, 0x5, 0x1}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async, rerun: 64) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) (async, rerun: 64) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)=@random={'os2.', '(/]*\x00'}, &(0x7f0000000a00)='!\\\x00', 0x3, 0x0) 07:46:24 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") (fail_nth: 8) 07:46:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x0, 0xa]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:24 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x3cc}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2938.356183][ T8966] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2938.364444][ T8935] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2938.396958][ T8935] syz-executor.4 (8935) used greatest stack depth: 8712 bytes left [ 2938.411698][ T8970] FAULT_INJECTION: forcing a failure. [ 2938.411698][ T8970] name failslab, interval 1, probability 0, space 0, times 0 [ 2938.425061][ T8970] CPU: 0 PID: 8970 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2938.435506][ T8970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2938.445615][ T8970] Call Trace: [ 2938.448911][ T8970] [ 2938.451891][ T8970] dump_stack_lvl+0xda/0x130 [ 2938.456528][ T8970] dump_stack+0x15/0x20 [ 2938.460548][ T8974] FAULT_INJECTION: forcing a failure. [ 2938.460548][ T8974] name failslab, interval 1, probability 0, space 0, times 0 [ 2938.460719][ T8970] should_fail_ex+0x21f/0x230 [ 2938.478050][ T8970] __should_failslab+0x92/0xa0 [ 2938.482880][ T8970] should_failslab+0x9/0x20 [ 2938.487410][ T8970] slab_pre_alloc_hook+0x38/0x180 [ 2938.492501][ T8970] kmem_cache_alloc+0x52/0x220 [ 2938.497349][ T8970] ? vm_area_alloc+0x2c/0x130 [ 2938.502097][ T8970] vm_area_alloc+0x2c/0x130 [ 2938.506636][ T8970] mmap_region+0x711/0x14d0 [ 2938.511219][ T8970] ? security_mmap_addr+0x46/0x60 [ 2938.516279][ T8970] ? get_unmapped_area+0x250/0x280 [ 2938.521461][ T8970] do_mmap+0x69c/0xaa0 [ 2938.525619][ T8970] vm_mmap_pgoff+0x12f/0x240 [ 2938.530310][ T8970] ksys_mmap_pgoff+0xc5/0x330 [ 2938.535056][ T8970] do_syscall_64+0x41/0xc0 [ 2938.539548][ T8970] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2938.545469][ T8970] RIP: 0033:0x7fe800407b63 [ 2938.549893][ T8970] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 b0 ff ff ff 64 c7 [ 2938.569534][ T8970] RSP: 002b:00007fe7ff789e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2938.578027][ T8970] RAX: ffffffffffffffda RBX: 000000000000021c RCX: 00007fe800407b63 [ 2938.586008][ T8970] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 2938.593988][ T8970] RBP: 00000000200006c2 R08: 00000000ffffffff R09: 0000000000000000 [ 2938.601995][ T8970] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000005 07:46:24 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) (fail_nth: 8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 07:46:24 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") (fail_nth: 9) [ 2938.610077][ T8970] R13: 00007fe7ff789f3c R14: 00007fe7ff789f40 R15: 00000000200000c0 [ 2938.618139][ T8970] [ 2938.621183][ T8974] CPU: 1 PID: 8974 Comm: syz-executor.5 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2938.631591][ T8974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2938.641787][ T8974] Call Trace: [ 2938.645118][ T8974] [ 2938.648247][ T8974] dump_stack_lvl+0xda/0x130 [ 2938.652952][ T8974] dump_stack+0x15/0x20 [ 2938.657194][ T8974] should_fail_ex+0x21f/0x230 [ 2938.661908][ T8974] __should_failslab+0x92/0xa0 [ 2938.666748][ T8974] should_failslab+0x9/0x20 [ 2938.667212][ T8979] FAULT_INJECTION: forcing a failure. [ 2938.667212][ T8979] name failslab, interval 1, probability 0, space 0, times 0 [ 2938.671328][ T8974] slab_pre_alloc_hook+0x38/0x180 [ 2938.689037][ T8974] kmem_cache_alloc+0x52/0x220 [ 2938.693914][ T8974] ? vm_area_alloc+0xac/0x130 [ 2938.698644][ T8974] vm_area_alloc+0xac/0x130 [ 2938.703193][ T8974] mmap_region+0x711/0x14d0 [ 2938.707711][ T8974] ? security_mmap_addr+0x46/0x60 [ 2938.712755][ T8974] ? get_unmapped_area+0x250/0x280 [ 2938.717928][ T8974] do_mmap+0x69c/0xaa0 [ 2938.722043][ T8974] vm_mmap_pgoff+0x12f/0x240 [ 2938.726658][ T8974] ksys_mmap_pgoff+0x2b8/0x330 [ 2938.731434][ T8974] do_syscall_64+0x41/0xc0 [ 2938.735864][ T8974] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2938.741795][ T8974] RIP: 0033:0x7f09a9accb29 [ 2938.746247][ T8974] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2938.765869][ T8974] RSP: 002b:00007f09a8e4f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2938.774289][ T8974] RAX: ffffffffffffffda RBX: 00007f09a9bebf80 RCX: 00007f09a9accb29 [ 2938.782329][ T8974] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 0000000020000000 [ 2938.790328][ T8974] RBP: 00007f09a8e4f120 R08: 0000000000000004 R09: 0000000000000000 [ 2938.798377][ T8974] R10: 0000000000010012 R11: 0000000000000246 R12: 0000000000000001 [ 2938.806356][ T8974] R13: 000000000000000b R14: 00007f09a9bebf80 R15: 00007fff1ccf7fc8 [ 2938.814338][ T8974] [ 2938.817404][ T8979] CPU: 0 PID: 8979 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2938.827796][ T8979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2938.837878][ T8979] Call Trace: [ 2938.841217][ T8979] [ 2938.844162][ T8979] dump_stack_lvl+0xda/0x130 [ 2938.848784][ T8979] dump_stack+0x15/0x20 [ 2938.852996][ T8979] should_fail_ex+0x21f/0x230 [ 2938.857692][ T8979] __should_failslab+0x92/0xa0 [ 2938.862494][ T8979] should_failslab+0x9/0x20 [ 2938.867019][ T8979] slab_pre_alloc_hook+0x38/0x180 [ 2938.872094][ T8979] kmem_cache_alloc+0x52/0x220 [ 2938.876935][ T8979] ? vm_area_alloc+0xac/0x130 [ 2938.881644][ T8979] vm_area_alloc+0xac/0x130 [ 2938.886214][ T8979] mmap_region+0x711/0x14d0 [ 2938.890781][ T8979] ? security_mmap_addr+0x46/0x60 [ 2938.895835][ T8979] ? get_unmapped_area+0x250/0x280 [ 2938.901034][ T8979] do_mmap+0x69c/0xaa0 [ 2938.905126][ T8979] vm_mmap_pgoff+0x12f/0x240 [ 2938.909811][ T8979] ksys_mmap_pgoff+0xc5/0x330 [ 2938.914502][ T8979] do_syscall_64+0x41/0xc0 [ 2938.918954][ T8979] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2938.924887][ T8979] RIP: 0033:0x7fe800407b63 [ 2938.929323][ T8979] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 b0 ff ff ff 64 c7 [ 2938.949074][ T8979] RSP: 002b:00007fe7ff789e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2938.957507][ T8979] RAX: ffffffffffffffda RBX: 000000000000021c RCX: 00007fe800407b63 [ 2938.965494][ T8979] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 2938.973507][ T8979] RBP: 00000000200006c2 R08: 00000000ffffffff R09: 0000000000000000 [ 2938.981496][ T8979] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000005 [ 2938.989481][ T8979] R13: 00007fe7ff789f3c R14: 00007fe7ff789f40 R15: 00000000200000c0 [ 2938.997595][ T8979] [ 2939.001849][ T8981] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2939.053175][ T8987] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xacae}, 0x0) 07:46:25 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) (async) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r4) (async, rerun: 32) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (rerun: 32) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r6 = openat$cgroup_procs(r5, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r6, &(0x7f00000001c0)=[{0x0}], 0x1) (async, rerun: 64) prlimit64(0x0, 0x0, 0x0, 0x0) (rerun: 64) r7 = socket$netlink(0x10, 0x3, 0x0) (async, rerun: 64) r8 = socket$netlink(0x10, 0x3, 0x0) (async, rerun: 64) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) (async) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) (async, rerun: 64) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0x5729, 0x40, 0x6}) (async, rerun: 64) r9 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r9, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) (async, rerun: 32) write$binfmt_misc(r9, &(0x7f00000000c0)=ANY=[@ANYRES32=r9], 0xfff7) (async, rerun: 32) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x170}], 0x1, &(0x7f0000000d80)=ANY=[@ANYBLOB="1c000000000000000100000001000000cec456146cc68957c89e67f1e9517b51b449d946bfab07dc18f53a5225e53ccc55f3a209790fe729ead14f011661955738211453b19479a9303295359c754951d7f5d141ff3f652f950f8cd9b009b831989938486410bf253c06975141e03f96a2ebb8052d", @ANYRES64, @ANYRES32, @ANYRESDEC, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES8=r7, @ANYRES32=r10, @ANYRES16, @ANYRES16=r3, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES8], 0x68, 0x1}, 0x20008004) (async, rerun: 64) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) (async, rerun: 64) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)=@deltclass={0xb8, 0x29, 0x2, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xa, 0xffe7}, {0xffe0, 0xfff1}, {0xfff1, 0x4}}, [@TCA_RATE={0x6, 0x5, {0x7, 0x99}}, @tclass_kind_options=@c_red={0x8}, @TCA_RATE={0x6, 0x5, {0x4, 0xff}}, @tclass_kind_options=@c_atm={{0x8}, {0x3c, 0x2, [@TCA_ATM_HDR={0x2d, 0x3, "21631207c525b01d86f7102260846739cf0c9c8faa130eab0a6438f842fd78ef9e29a771828ad52fcd"}, @TCA_ATM_EXCESS={0x8, 0x4, {0x1, 0xf}}]}}, @tclass_kind_options=@c_hfsc={{0x9}, {0x14, 0x2, [@TCA_HFSC_USC={0x10, 0x3, {0x40, 0xbd, 0x9}}]}}, @tclass_kind_options=@c_dsmark={{0xb}, {0xc, 0x2, @TCA_DSMARK_VALUE={0x5, 0x5, 0x1}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async, rerun: 32) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) (async, rerun: 32) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)=@random={'os2.', '(/]*\x00'}, &(0x7f0000000a00)='!\\\x00', 0x3, 0x0) 07:46:25 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) (fail_nth: 9) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 07:46:25 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x3e0}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:46:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x0, 0xb]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:25 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") (fail_nth: 10) [ 2939.344489][ T8954] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2939.380334][ T8992] FAULT_INJECTION: forcing a failure. [ 2939.380334][ T8992] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.393187][ T8992] CPU: 1 PID: 8992 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2939.403558][ T8992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2939.408572][ T8995] FAULT_INJECTION: forcing a failure. [ 2939.408572][ T8995] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.413633][ T8992] Call Trace: [ 2939.413642][ T8992] [ 2939.413684][ T8992] dump_stack_lvl+0xda/0x130 [ 2939.437250][ T8992] dump_stack+0x15/0x20 [ 2939.441449][ T8992] should_fail_ex+0x21f/0x230 [ 2939.446137][ T8992] __should_failslab+0x92/0xa0 [ 2939.450952][ T8992] should_failslab+0x9/0x20 [ 2939.455517][ T8992] slab_pre_alloc_hook+0x38/0x180 [ 2939.460591][ T8992] kmem_cache_alloc+0x52/0x220 [ 2939.465395][ T8992] ? mas_alloc_nodes+0x1e2/0x490 [ 2939.470381][ T8992] mas_alloc_nodes+0x1e2/0x490 [ 2939.475287][ T8992] ? kmem_cache_alloc+0x10f/0x220 [ 2939.480331][ T8992] mas_preallocate+0xb8/0x1e0 [ 2939.485024][ T8992] mmap_region+0xb7d/0x14d0 [ 2939.489617][ T8992] ? security_mmap_addr+0x46/0x60 [ 2939.494692][ T8992] ? get_unmapped_area+0x250/0x280 [ 2939.499817][ T8992] do_mmap+0x69c/0xaa0 [ 2939.503983][ T8992] vm_mmap_pgoff+0x12f/0x240 [ 2939.508644][ T8992] ksys_mmap_pgoff+0xc5/0x330 [ 2939.513347][ T8992] do_syscall_64+0x41/0xc0 [ 2939.517839][ T8992] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2939.523773][ T8992] RIP: 0033:0x7fe800407b63 [ 2939.528215][ T8992] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 b0 ff ff ff 64 c7 [ 2939.547876][ T8992] RSP: 002b:00007fe7ff789e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2939.556330][ T8992] RAX: ffffffffffffffda RBX: 000000000000021c RCX: 00007fe800407b63 [ 2939.564401][ T8992] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 2939.572378][ T8992] RBP: 00000000200006c2 R08: 00000000ffffffff R09: 0000000000000000 [ 2939.580364][ T8992] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000005 [ 2939.588354][ T8992] R13: 00007fe7ff789f3c R14: 00007fe7ff789f40 R15: 00000000200000c0 [ 2939.596349][ T8992] [ 2939.599375][ T8995] CPU: 0 PID: 8995 Comm: syz-executor.5 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2939.609882][ T8995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2939.619968][ T8995] Call Trace: [ 2939.623270][ T8995] [ 2939.626220][ T8995] dump_stack_lvl+0xda/0x130 [ 2939.630846][ T8995] dump_stack+0x15/0x20 [ 2939.635245][ T8995] should_fail_ex+0x21f/0x230 [ 2939.639956][ T8995] __should_failslab+0x92/0xa0 [ 2939.644821][ T8995] should_failslab+0x9/0x20 [ 2939.649460][ T8995] slab_pre_alloc_hook+0x38/0x180 [ 2939.654565][ T8995] kmem_cache_alloc+0x52/0x220 [ 2939.659360][ T8995] ? mas_alloc_nodes+0x1e2/0x490 [ 2939.664396][ T8995] mas_alloc_nodes+0x1e2/0x490 [ 2939.669184][ T8995] mas_preallocate+0xb8/0x1e0 [ 2939.673956][ T8995] mmap_region+0xb7d/0x14d0 [ 2939.678481][ T8995] ? security_mmap_addr+0x46/0x60 [ 2939.683520][ T8995] ? get_unmapped_area+0x250/0x280 [ 2939.688749][ T8995] do_mmap+0x69c/0xaa0 [ 2939.692835][ T8995] vm_mmap_pgoff+0x12f/0x240 [ 2939.697442][ T8995] ksys_mmap_pgoff+0x2b8/0x330 [ 2939.702219][ T8995] do_syscall_64+0x41/0xc0 [ 2939.706714][ T8995] ? irqentry_exit+0x12/0x40 [ 2939.711323][ T8995] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2939.717242][ T8995] RIP: 0033:0x7f09a9accb29 [ 2939.721709][ T8995] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2939.741372][ T8995] RSP: 002b:00007f09a8e4f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2939.749790][ T8995] RAX: ffffffffffffffda RBX: 00007f09a9bebf80 RCX: 00007f09a9accb29 [ 2939.757833][ T8995] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 0000000020000000 [ 2939.765810][ T8995] RBP: 00007f09a8e4f120 R08: 0000000000000004 R09: 0000000000000000 [ 2939.773838][ T8995] R10: 0000000000010012 R11: 0000000000000246 R12: 0000000000000001 [ 2939.781814][ T8995] R13: 000000000000000b R14: 00007f09a9bebf80 R15: 00007fff1ccf7fc8 [ 2939.789800][ T8995] 07:46:25 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$eJzs3bFqU1EcBvB/bNRakHQQiiJ4xcUptBX3FKkgBhQlg04W26I0tWChoENbJ19CX0FHV8FBXH0BEaQKLtapgxCpNyZNSWKkpreY32/pR+/5cs65Qy4ZcnLn9OLC7NLy/ObmRgwP5yJfilJs5WI0DsVQpNYDAPifbNVq8a2WynotAMD+8PwHgMHT7fmfW2/87/r+rwwA6Bef/wFg8Ny8dfvqVLk8fSNJhiMWn65UVirp3/T61Hzcj2rMxXgU4kdErSHNl6+Up8eTbZ9Ho7K4Vu+vrVSGWvsTUYjR9v2JJNXaPxwj9f6HkZiLySjEifb9ybb9I3H+3I75i1GI93djKaoxG9vdZn91IkkuXSvv6h/9NQ4AAAAAAAAAAAAAAAAAAAAAAPqhmDS0Pb+nWOx0Pe3vPB/oWNfzgXafz5OPU/ls9w4AAAAAAAAAAAAAAAAAAAAHxfKjxwsz1ercw27hwbsXb/40pseQq8+719fZezh+9tOzzmOe/M39+bfh9Zksb0uP4e3GvZMXlscudhoT+axX2Bq+FiL6NMXL36H0/SDstFMYe16aebX68UuvrQzflAAAAAAAAAAAAAAAAAAAYEA1v/Sb9UoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDvN3//vW1jPeo8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPAzAAD//4c6qcs=") (fail_nth: 11) 07:46:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x0, 0xc]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) [ 2939.792895][ T9006] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2939.829988][ T9012] FAULT_INJECTION: forcing a failure. [ 2939.829988][ T9012] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.842684][ T9012] CPU: 0 PID: 9012 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2939.853062][ T9012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2939.863164][ T9012] Call Trace: [ 2939.866468][ T9012] [ 2939.869449][ T9012] dump_stack_lvl+0xda/0x130 [ 2939.874079][ T9012] dump_stack+0x15/0x20 07:46:25 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) r3 = shmget$private(0x0, 0x6000, 0x0, &(0x7f0000c71000/0x6000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000340)={{0x0, r2, 0xffffffffffffffff, r2, 0x0, 0x110, 0x3f}, 0x6, 0x3, 0x80, 0x5, r4, 0x0, 0xb81}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r5) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r7 = openat$cgroup_procs(r6, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r7, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) write(r5, &(0x7f0000000080)="d469c7c62d453d510a044ece317e653b08e1e139e0dfe3bbeac5d7d81cef76103d50938d3635cf76d328fdf17b2a2b4759e6de9a3712e8ab0e2569bb", 0x3c) socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000200)={0x44, 0x10, 0x1, 0x0, 0x6, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x9, 0x0, 0x0, 0x0, @str='rfdno'}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x44}], 0x1}, 0x0) 07:46:25 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) (fail_nth: 10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 2939.878278][ T9012] should_fail_ex+0x21f/0x230 [ 2939.882977][ T9012] __should_failslab+0x92/0xa0 [ 2939.887881][ T9012] should_failslab+0x9/0x20 [ 2939.892437][ T9012] slab_pre_alloc_hook+0x38/0x180 [ 2939.897590][ T9012] kmem_cache_alloc_bulk+0x4f/0x280 [ 2939.902839][ T9012] ? mas_alloc_nodes+0x1e2/0x490 [ 2939.904791][ T9017] FAULT_INJECTION: forcing a failure. [ 2939.904791][ T9017] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.907847][ T9012] mas_alloc_nodes+0x2bb/0x490 [ 2939.925239][ T9012] mas_preallocate+0xb8/0x1e0 [ 2939.929957][ T9012] mmap_region+0xb7d/0x14d0 [ 2939.934477][ T9012] ? security_mmap_addr+0x46/0x60 [ 2939.939535][ T9012] ? get_unmapped_area+0x250/0x280 [ 2939.944667][ T9012] do_mmap+0x69c/0xaa0 [ 2939.948807][ T9012] vm_mmap_pgoff+0x12f/0x240 [ 2939.953414][ T9012] ksys_mmap_pgoff+0xc5/0x330 [ 2939.958108][ T9012] do_syscall_64+0x41/0xc0 [ 2939.962580][ T9012] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2939.968628][ T9012] RIP: 0033:0x7fe800407b63 [ 2939.973047][ T9012] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 b0 ff ff ff 64 c7 [ 2939.992812][ T9012] RSP: 002b:00007fe7ff789e98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2940.001243][ T9012] RAX: ffffffffffffffda RBX: 000000000000021c RCX: 00007fe800407b63 [ 2940.009222][ T9012] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 2940.017256][ T9012] RBP: 00000000200006c2 R08: 00000000ffffffff R09: 0000000000000000 [ 2940.025233][ T9012] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000005 [ 2940.033211][ T9012] R13: 00007fe7ff789f3c R14: 00007fe7ff789f40 R15: 00000000200000c0 [ 2940.041324][ T9012] [ 2940.044377][ T9017] CPU: 1 PID: 9017 Comm: syz-executor.5 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2940.054738][ T9017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2940.064826][ T9017] Call Trace: [ 2940.068182][ T9017] [ 2940.071121][ T9017] dump_stack_lvl+0xda/0x130 [ 2940.075740][ T9017] dump_stack+0x15/0x20 [ 2940.080002][ T9017] should_fail_ex+0x21f/0x230 [ 2940.084728][ T9017] __should_failslab+0x92/0xa0 [ 2940.089555][ T9017] should_failslab+0x9/0x20 [ 2940.094089][ T9017] slab_pre_alloc_hook+0x38/0x180 [ 2940.099197][ T9017] kmem_cache_alloc_bulk+0x4f/0x280 [ 2940.104507][ T9017] ? mas_alloc_nodes+0x1e2/0x490 [ 2940.109493][ T9017] mas_alloc_nodes+0x2bb/0x490 [ 2940.114336][ T9017] mas_preallocate+0xb8/0x1e0 [ 2940.119040][ T9017] mmap_region+0xb7d/0x14d0 [ 2940.123637][ T9017] ? security_mmap_addr+0x46/0x60 [ 2940.128693][ T9017] ? get_unmapped_area+0x250/0x280 [ 2940.133884][ T9017] do_mmap+0x69c/0xaa0 [ 2940.138033][ T9017] vm_mmap_pgoff+0x12f/0x240 [ 2940.142798][ T9017] ksys_mmap_pgoff+0x2b8/0x330 [ 2940.147587][ T9017] do_syscall_64+0x41/0xc0 [ 2940.152059][ T9017] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2940.158077][ T9017] RIP: 0033:0x7f09a9accb29 [ 2940.162511][ T9017] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2940.182148][ T9017] RSP: 002b:00007f09a8e4f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2940.190740][ T9017] RAX: ffffffffffffffda RBX: 00007f09a9bebf80 RCX: 00007f09a9accb29 [ 2940.198796][ T9017] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 0000000020000000 [ 2940.206865][ T9017] RBP: 00007f09a8e4f120 R08: 0000000000000004 R09: 0000000000000000 [ 2940.214850][ T9017] R10: 0000000000010012 R11: 0000000000000246 R12: 0000000000000002 [ 2940.222833][ T9017] R13: 000000000000000b R14: 00007f09a9bebf80 R15: 00007fff1ccf7fc8 [ 2940.230826][ T9017] [ 2940.234717][ T9018] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2940.252453][ T9007] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 07:46:25 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) (fail_nth: 11) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 2940.281114][ T9015] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2940.293925][ T9004] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:26 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") (fail_nth: 12) 07:46:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xacaf}, 0x0) 07:46:26 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xfff7) r2 = socket$inet6(0xa, 0x3, 0xe2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="f68e9c2f084beea69b934cbcac63badee68c4af9a9ea5d002b51b23b29e1b763b8352380ed022a6d1bca9961eeff4b0f84a333087fab5fdf54ed9177109fc7c0a13419591449262f0237def0c5ded27df0792f7e8ad3ef05e75e725f2b08c188a7567bce62b63f814f4f016de74e6a21207d7ba2abe2072a3cb7c7adb877b91b0692ad26432189d10c5d5531e547ef03b1234914681d81c44338ca779da9c89b6472d3766619eb0aa93a436cbd347e5de8dae1d18563c8713086c1"], 0xfff7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {0x3e4}, [@common=@inet=@multiport={{0x50}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000140)=0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x5729, 0x40, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x2}, 0x1c) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001380)=ANY=[@ANYBLOB="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"/660], 0x170}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES64, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000028000000000000000100000081000000", @ANYRES32=r3, @ANYRES8, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYRES16=r3], 0x68}, 0x20008004) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="38000000100001000000000000000000080000000000000008000000", @ANYRES32=0x0, @ANYBLOB="14001b"], 0x38}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe459, 0x64}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008080}, 0x2008000) sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008820) syz_clone3(&(0x7f0000000800)={0x41001400, &(0x7f0000000300), 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2940.504139][ T9022] FAULT_INJECTION: forcing a failure. [ 2940.504139][ T9022] name failslab, interval 1, probability 0, space 0, times 0 [ 2940.516909][ T9022] CPU: 0 PID: 9022 Comm: syz-executor.5 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2940.527272][ T9022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2940.537415][ T9022] Call Trace: [ 2940.540763][ T9022] [ 2940.543707][ T9022] dump_stack_lvl+0xda/0x130 [ 2940.548412][ T9022] dump_stack+0x15/0x20 [ 2940.552590][ T9022] should_fail_ex+0x21f/0x230 [ 2940.557417][ T9022] __should_failslab+0x92/0xa0 [ 2940.562242][ T9022] should_failslab+0x9/0x20 [ 2940.566804][ T9022] slab_pre_alloc_hook+0x38/0x180 [ 2940.571885][ T9022] kmem_cache_alloc_bulk+0x4f/0x280 [ 2940.574190][ T9024] FAULT_INJECTION: forcing a failure. [ 2940.574190][ T9024] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2940.577107][ T9022] ? mas_alloc_nodes+0x1e2/0x490 [ 2940.595263][ T9022] mas_alloc_nodes+0x2bb/0x490 [ 2940.600075][ T9022] mas_preallocate+0xb8/0x1e0 [ 2940.604842][ T9022] mmap_region+0xb7d/0x14d0 [ 2940.609390][ T9022] ? security_mmap_addr+0x46/0x60 [ 2940.614434][ T9022] ? get_unmapped_area+0x250/0x280 [ 2940.619554][ T9022] do_mmap+0x69c/0xaa0 [ 2940.623649][ T9022] vm_mmap_pgoff+0x12f/0x240 [ 2940.628295][ T9022] ksys_mmap_pgoff+0x2b8/0x330 [ 2940.633104][ T9022] do_syscall_64+0x41/0xc0 [ 2940.637551][ T9022] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2940.643553][ T9022] RIP: 0033:0x7f09a9accb29 [ 2940.648106][ T9022] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2940.667784][ T9022] RSP: 002b:00007f09a8e4f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 2940.676254][ T9022] RAX: ffffffffffffffda RBX: 00007f09a9bebf80 RCX: 00007f09a9accb29 [ 2940.684232][ T9022] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 0000000020000000 [ 2940.692301][ T9022] RBP: 00007f09a8e4f120 R08: 0000000000000004 R09: 0000000000000000 07:46:26 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) (async) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) (async) r3 = shmget$private(0x0, 0x6000, 0x0, &(0x7f0000c71000/0x6000)=nil) shmctl$SHM_LOCK(r3, 0xb) (async) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) (async) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000340)={{0x0, r2, 0xffffffffffffffff, r2, 0x0, 0x110, 0x3f}, 0x6, 0x3, 0x80, 0x5, r4, 0x0, 0xb81}) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) (async) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r5) (async) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) (async) r7 = openat$cgroup_procs(r6, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r7, &(0x7f00000001c0)=[{0x0}], 0x1) (async) prlimit64(0x0, 0x0, 0x0, 0x0) (async) write(r5, &(0x7f0000000080)="d469c7c62d453d510a044ece317e653b08e1e139e0dfe3bbeac5d7d81cef76103d50938d3635cf76d328fdf17b2a2b4759e6de9a3712e8ab0e2569bb", 0x3c) socket$netlink(0x10, 0x3, 0x0) (async) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000200)={0x44, 0x10, 0x1, 0x0, 0x6, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x9, 0x0, 0x0, 0x0, @str='rfdno'}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x44}], 0x1}, 0x0) [ 2940.700280][ T9022] R10: 0000000000010012 R11: 0000000000000246 R12: 0000000000000002 [ 2940.708259][ T9022] R13: 000000000000000b R14: 00007f09a9bebf80 R15: 00007fff1ccf7fc8 [ 2940.716320][ T9022] [ 2940.719343][ T9024] CPU: 1 PID: 9024 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2940.729713][ T9024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2940.739823][ T9024] Call Trace: [ 2940.743120][ T9024] [ 2940.746066][ T9024] dump_stack_lvl+0xda/0x130 [ 2940.750689][ T9024] dump_stack+0x15/0x20 07:46:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) (fail_nth: 12) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 07:46:26 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) (async) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x8101}}]}}) geteuid() (async) r2 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r2, 0xee01, 0x800) r3 = shmget$private(0x0, 0x6000, 0x0, &(0x7f0000c71000/0x6000)=nil) shmctl$SHM_LOCK(r3, 0xb) getpid() (async) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000340)={{0x0, r2, 0xffffffffffffffff, r2, 0x0, 0x110, 0x3f}, 0x6, 0x3, 0x80, 0x5, r4, 0x0, 0xb81}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r5) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) (async) open(0x0, 0x0, 0x20) r7 = openat$cgroup_procs(r6, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r7, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) write(r5, &(0x7f0000000080)="d469c7c62d453d510a044ece317e653b08e1e139e0dfe3bbeac5d7d81cef76103d50938d3635cf76d328fdf17b2a2b4759e6de9a3712e8ab0e2569bb", 0x3c) (async) write(r5, &(0x7f0000000080)="d469c7c62d453d510a044ece317e653b08e1e139e0dfe3bbeac5d7d81cef76103d50938d3635cf76d328fdf17b2a2b4759e6de9a3712e8ab0e2569bb", 0x3c) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) (async) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000200)={0x44, 0x10, 0x1, 0x0, 0x6, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x9, 0x0, 0x0, 0x0, @str='rfdno'}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x44}], 0x1}, 0x0) (async) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000200)={0x44, 0x10, 0x1, 0x0, 0x6, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x9, 0x0, 0x0, 0x0, @str='rfdno'}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x44}], 0x1}, 0x0) [ 2940.754881][ T9024] should_fail_ex+0x21f/0x230 [ 2940.759584][ T9024] __should_fail_alloc_page+0xfd/0x110 [ 2940.765078][ T9024] __alloc_pages+0x108/0x340 [ 2940.769715][ T9024] alloc_pages+0x3e1/0x4e0 [ 2940.774179][ T9024] pte_alloc_one+0x2d/0xc0 [ 2940.778643][ T9024] __pte_alloc+0x33/0x200 [ 2940.782999][ T9024] handle_mm_fault+0x1e18/0x2c10 [ 2940.788145][ T9024] ? mt_find+0x1d1/0x300 [ 2940.792592][ T9024] exc_page_fault+0x24d/0x650 [ 2940.797381][ T9024] asm_exc_page_fault+0x26/0x30 [ 2940.802343][ T9024] RIP: 0033:0x7fe8003b3673 [ 2940.805316][ T9033] FAULT_INJECTION: forcing a failure. [ 2940.805316][ T9033] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2940.806755][ T9024] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 2940.806782][ T9024] RSP: 002b:00007fe7ff789520 EFLAGS: 00010206 [ 2940.845558][ T9024] RAX: 0000000000000000 RBX: 00007fe7ff7895c0 RCX: 00007fe7f736a000 [ 2940.853619][ T9024] RDX: 00007fe7ff789760 RSI: 0000000000000007 RDI: 00007fe7ff789660 [ 2940.861652][ T9024] RBP: 000000000000013c R08: 0000000000000009 R09: 000000000000019e [ 2940.869633][ T9024] R10: 00000000000001c2 R11: 00007fe7ff7895c0 R12: 00007fe7ff7895c0 [ 2940.877675][ T9024] R13: 00007fe800475300 R14: 0000000000000060 R15: 00007fe7ff789660 [ 2940.885661][ T9024] [ 2940.888682][ T9033] CPU: 0 PID: 9033 Comm: syz-executor.5 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2940.888885][ T9024] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 2940.899024][ T9033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2940.899041][ T9033] Call Trace: [ 2940.899047][ T9033] [ 2940.899055][ T9033] dump_stack_lvl+0xda/0x130 [ 2940.899089][ T9033] dump_stack+0x15/0x20 [ 2940.899113][ T9033] should_fail_ex+0x21f/0x230 [ 2940.899192][ T9033] should_fail+0xb/0x10 [ 2940.899214][ T9033] should_fail_usercopy+0x1a/0x20 [ 2940.899240][ T9033] _copy_from_user+0x1e/0xd0 [ 2940.927112][ T9024] loop0: detected capacity change from 0 to 256 [ 2940.927657][ T9033] kstrtouint_from_user+0x76/0xe0 [ 2940.937614][ T9035] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2940.940635][ T9033] ? 0xffffffff81000000 [ 2940.945823][ T9036] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2940.950263][ T9033] proc_fail_nth_write+0x4f/0x150 [ 2940.974868][ T9041] validate_nla: 2 callbacks suppressed [ 2940.974885][ T9041] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2940.974983][ T9033] ? proc_fail_nth_read+0x140/0x140 [ 2941.008308][ T9033] vfs_write+0x27a/0x7d0 [ 2941.012665][ T9033] ? __fget_files+0x1c4/0x200 [ 2941.017370][ T9033] ? mutex_lock+0xd/0x30 [ 2941.021623][ T9033] ksys_write+0xeb/0x1a0 [ 2941.025962][ T9033] __x64_sys_write+0x42/0x50 [ 2941.030641][ T9033] do_syscall_64+0x41/0xc0 [ 2941.035072][ T9033] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2941.040997][ T9033] RIP: 0033:0x7f09a9acb86f [ 2941.045466][ T9033] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 2941.065149][ T9033] RSP: 002b:00007f09a8e4f0c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2941.073590][ T9033] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f09a9acb86f [ 2941.081586][ T9033] RDX: 0000000000000001 RSI: 00007f09a8e4f130 RDI: 0000000000000005 [ 2941.089562][ T9033] RBP: 00007f09a8e4f120 R08: 0000000000000000 R09: 0000000000000000 [ 2941.097544][ T9033] R10: 0000000000010012 R11: 0000000000000293 R12: 0000000000000002 07:46:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000580)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x170, 0x1170, 0x1170, 0x0, 0x1170, 0x398, 0x1398, 0x1398, 0x398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], 'veth0_vlan\x00', 'veth0_to_hsr\x00', {}, {}, 0x84}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x0, 0x0, 0x0, 0xd]}}, @common=@unspec=@connmark={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @remote, @private2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 07:46:26 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000540)=0x0, &(0x7f0000000580)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1068, &(0x7f0000001700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid={'afid', 0x3d, 0x9}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'cgroup.procs\x00'}}, {@uid_eq={'uid', 0x3d, r2}}]}}) r3 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r3, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r4) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) r6 = openat$cgroup_procs(r5, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r6, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0, 0x8, &(0x7f0000000240), 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendto$packet(r0, &(0x7f0000000640)="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", 0x1000, 0x4040014, &(0x7f0000000500)={0x11, 0xef, r8, 0x1, 0x45, 0x6, @multicast}, 0x14) 07:46:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 2941.105567][ T9033] R13: 000000000000000b R14: 00007f09a9bebf80 R15: 00007fff1ccf7fc8 [ 2941.113550][ T9033] [ 2941.116627][ T9042] xt_CT: You must specify a L4 protocol and not use inversions on it 07:46:26 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1009210, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") (fail_nth: 13) 07:46:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1, 0x0, 0x0, 0xacb0}, 0x0) [ 2941.165838][ T9041] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2941.183262][ T9046] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 07:46:26 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) (async) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) (async) getresuid(&(0x7f0000000240), &(0x7f0000000540)=0x0, &(0x7f0000000580)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1068, &(0x7f0000001700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid={'afid', 0x3d, 0x9}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'cgroup.procs\x00'}}, {@uid_eq={'uid', 0x3d, r2}}]}}) r3 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r3, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) (async, rerun: 64) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) (rerun: 64) dup(r4) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) (async) r6 = openat$cgroup_procs(r5, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r6, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) (async) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0, 0x8, &(0x7f0000000240), 0x0, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendto$packet(r0, &(0x7f0000000640)="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", 0x1000, 0x4040014, &(0x7f0000000500)={0x11, 0xef, r8, 0x1, 0x45, 0x6, @multicast}, 0x14) [ 2941.219732][ T9046] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2941.264813][ T9054] FAULT_INJECTION: forcing a failure. [ 2941.264813][ T9054] name failslab, interval 1, probability 0, space 0, times 0 [ 2941.277756][ T9054] CPU: 0 PID: 9054 Comm: syz-executor.0 Not tainted 6.5.0-rc3-syzkaller-00283-g12214540ad87 #0 [ 2941.288108][ T9054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 2941.298180][ T9054] Call Trace: [ 2941.301504][ T9054] [ 2941.304556][ T9054] dump_stack_lvl+0xda/0x130 [ 2941.309176][ T9054] dump_stack+0x15/0x20 [ 2941.313366][ T9054] should_fail_ex+0x21f/0x230 [ 2941.318069][ T9054] __should_failslab+0x92/0xa0 [ 2941.322960][ T9054] should_failslab+0x9/0x20 [ 2941.327505][ T9054] slab_pre_alloc_hook+0x38/0x180 [ 2941.332562][ T9054] kmem_cache_alloc+0x52/0x220 [ 2941.337352][ T9054] ? __anon_vma_prepare+0x45/0x2b0 [ 2941.342493][ T9054] __anon_vma_prepare+0x45/0x2b0 [ 2941.347475][ T9054] handle_mm_fault+0x1f5c/0x2c10 [ 2941.352570][ T9054] ? mt_find+0x1d1/0x300 [ 2941.356894][ T9054] exc_page_fault+0x24d/0x650 [ 2941.361596][ T9054] asm_exc_page_fault+0x26/0x30 [ 2941.366489][ T9054] RIP: 0033:0x7fe8003b3673 [ 2941.370921][ T9054] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 2941.390594][ T9054] RSP: 002b:00007fe7ff768520 EFLAGS: 00010206 [ 2941.396738][ T9054] RAX: 0000000000000000 RBX: 00007fe7ff7685c0 RCX: 00007fe7f7349000 [ 2941.404965][ T9054] RDX: 00007fe7ff768760 RSI: 0000000000000007 RDI: 00007fe7ff768660 [ 2941.412958][ T9054] RBP: 000000000000013c R08: 0000000000000009 R09: 000000000000019e [ 2941.420954][ T9054] R10: 00000000000001c2 R11: 00007fe7ff7685c0 R12: 00007fe7ff7685c0 [ 2941.428998][ T9054] R13: 00007fe800475300 R14: 0000000000000060 R15: 00007fe7ff768660 [ 2941.436992][ T9054] [ 2941.440217][ T9054] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF 07:46:27 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40c2, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x1008200, &(0x7f00000000c0)={[{@shortname_winnt}, {@numtail}, {@uni_xlate}, {@utf8}, {@fat=@discard}, {@uni_xlateno}, {@shortname_winnt}, {@utf8}]}, 0x3, 0x21e, &(0x7f00000006c0)="$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") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400002, 0x1, 0x10012, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 2941.474651][ T9056] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 07:46:27 executing program 4: open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) (async) r0 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) (async) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000540)=0x0, &(0x7f0000000580)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1068, &(0x7f0000001700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid={'afid', 0x3d, 0x9}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'cgroup.procs\x00'}}, {@uid_eq={'uid', 0x3d, r2}}]}}) (async) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1068, &(0x7f0000001700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid={'afid', 0x3d, 0x9}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'cgroup.procs\x00'}}, {@uid_eq={'uid', 0x3d, r2}}]}}) r3 = geteuid() fchownat(r0, &(0x7f0000000140)='./file0\x00', r3, 0xee01, 0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) (async) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r4) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) open(0x0, 0x0, 0x20) (async) open(0x0, 0x0, 0x20) r6 = openat$cgroup_procs(r5, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r6, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) (async) prlimit64(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0], &