valid protocol: 0 0.0.0.0:0 fo [ 914.104144] device lo left promiscuous mode [ 914.126366] device lo entered promiscuous mode 2033/05/18 03:47:00 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x4000, &(0x7f00000001c0)) r1 = dup3(r0, r0, 0x80000) ioctl$BLKRAGET(r1, 0x1263, &(0x7f00000000c0)) 2033/05/18 03:47:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000600"}) 2033/05/18 03:47:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0600"}, 0x2c) 2033/05/18 03:47:00 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"67726530000000000000fdfdffff00", {0x2}}) 2033/05/18 03:47:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000000600"}) 2033/05/18 03:47:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x48f, 'fo\x00'}, 0x2c) [ 914.260806] device lo left promiscuous mode [ 914.268668] kernel msg: ebtables bug: please report to author: Wrong len argument [ 914.270508] autofs4:pid:18678:autofs4_fill_super: called with bogus options [ 914.287802] device lo entered promiscuous mode [ 914.296110] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0 fo 2033/05/18 03:47:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000600"}, 0x2c) [ 914.307411] device lo entered promiscuous mode [ 914.314898] kernel msg: ebtables bug: please report to author: Wrong len argument [ 914.334580] autofs4:pid:18696:autofs4_fill_super: called with bogus options [ 914.344319] device lo left promiscuous mode 2033/05/18 03:47:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:00 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000f00"}) 2033/05/18 03:47:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x100000000000000, 'fo\x00'}, 0x2c) 2033/05/18 03:47:00 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x4, &(0x7f00000001c0)) [ 914.359008] device lo entered promiscuous mode [ 914.367427] device lo left promiscuous mode [ 914.386957] autofs4:pid:18692:autofs4_fill_super: called with bogus options [ 914.445711] device lo left promiscuous mode [ 914.463494] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000300"}) 2033/05/18 03:47:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000048f00"}, 0x2c) 2033/05/18 03:47:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) [ 914.493605] device lo entered promiscuous mode [ 914.507578] autofs4:pid:18718:autofs4_fill_super: called with bogus options [ 914.524565] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000001100"}) 2033/05/18 03:47:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x600000000000000, 'fo\x00'}, 0x2c) 2033/05/18 03:47:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) [ 914.557760] autofs4:pid:18722:autofs4_fill_super: called with bogus options [ 914.582793] device lo entered promiscuous mode [ 914.624176] device lo left promiscuous mode [ 914.646243] device lo left promiscuous mode 2033/05/18 03:47:00 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/23, 0x17) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)="bea78b2a8d3ed625fa8a1661000000000000", 0x0, &(0x7f0000000100)="c7e08ac395") 2033/05/18 03:47:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000100"}, 0x2c) [ 914.673140] device lo entered promiscuous mode [ 914.693598] device lo left promiscuous mode [ 914.719171] device lo entered promiscuous mode [ 914.736195] device lo left promiscuous mode [ 914.774610] autofs4:pid:18740:autofs4_fill_super: called with bogus options 2033/05/18 03:47:00 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"677265300000000000000000000000ff", {0x2}}) 2033/05/18 03:47:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000600"}) 2033/05/18 03:47:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000600"}, 0x2c) 2033/05/18 03:47:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x8f040000, 'fo\x00'}, 0x2c) 2033/05/18 03:47:00 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) recvmsg(r0, &(0x7f0000000680)={&(0x7f0000000080)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000001c0)=""/88, 0x58}, {&(0x7f0000000100)=""/34, 0x22}, {&(0x7f0000000240)=""/120, 0x78}, {&(0x7f00000002c0)=""/110, 0x6e}, {&(0x7f0000000340)=""/187, 0xbb}, {&(0x7f0000000400)=""/212, 0xd4}], 0x6, &(0x7f0000000580)=""/238, 0xee}, 0x1) getpeername$packet(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000780)=0xffffff98) 2033/05/18 03:47:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000200"}) [ 914.885416] device lo entered promiscuous mode [ 914.893265] kernel msg: ebtables bug: please report to author: Wrong len argument [ 914.896837] autofs4:pid:18760:autofs4_fill_super: called with bogus options [ 914.915393] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0 fo [ 914.915994] device lo entered promiscuous mode 2033/05/18 03:47:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f8f0400"}, 0x2c) 2033/05/18 03:47:01 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 914.928842] kernel msg: ebtables bug: please report to author: Wrong len argument [ 914.929432] autofs4:pid:18777:autofs4_fill_super: called with bogus options [ 914.943800] device lo left promiscuous mode [ 914.975128] device lo left promiscuous mode 2033/05/18 03:47:01 executing program 6: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) [ 914.994113] device lo entered promiscuous mode [ 915.011259] device lo entered promiscuous mode [ 915.031948] device lo left promiscuous mode [ 915.038433] kernel msg: ebtables bug: please report to author: Wrong len argument [ 915.050119] kernel msg: ebtables bug: please report to author: Wrong len argument [ 915.075318] device lo left promiscuous mode [ 915.093379] autofs4:pid:18792:autofs4_fill_super: called with bogus options 2033/05/18 03:47:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x1000000, 'fo\x00'}, 0x2c) 2033/05/18 03:47:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"6772653000000000000000fffffdfd00", {0x2}}) 2033/05/18 03:47:01 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) 2033/05/18 03:47:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000001600"}) 2033/05/18 03:47:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000048f00"}, 0x2c) 2033/05/18 03:47:01 executing program 6: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f00000001c0)=0xc) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x420400, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd2, 0x3f, 0x1, 0x0, 0x0, 0x8, 0x4000, 0x8, 0x6, 0x4, 0xffff, 0x1ba, 0x20, 0x5, 0xfffffffffffffff7, 0x5, 0x101, 0x2ffa, 0x4, 0x110c, 0x20, 0x2, 0x6, 0x2, 0x5, 0x8, 0xfffffffffffff000, 0x8001, 0xffff, 0x14f3, 0x8001, 0x4, 0x0, 0xffffffffffffff20, 0xaff, 0xede, 0x0, 0x8, 0x1, @perf_config_ext={0x2, 0x1ff}, 0x2, 0xba49, 0x80, 0x7, 0x3f, 0x7, 0x9}, r0, 0x5, r1, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:01 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000000600"}) [ 915.204721] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0 fo [ 915.210705] device lo entered promiscuous mode [ 915.225996] device lo entered promiscuous mode [ 915.226954] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000100"}, 0x2c) [ 915.247764] kernel msg: ebtables bug: please report to author: Wrong len argument [ 915.255796] device lo left promiscuous mode [ 915.260756] autofs4:pid:18815:autofs4_fill_super: called with bogus options [ 915.275967] device lo left promiscuous mode [ 915.286536] device lo entered promiscuous mode 2033/05/18 03:47:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000048f00"}, 0x2c) 2033/05/18 03:47:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"67726530000000000000000000000100", {0x2}}) 2033/05/18 03:47:01 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) process_vm_readv(r0, &(0x7f0000000540)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000000c0)=""/13, 0xd}, {&(0x7f0000000100)=""/12, 0xc}, {&(0x7f00000002c0)=""/145, 0x91}, {&(0x7f0000000380)=""/196, 0xc4}, {&(0x7f0000000480)=""/115, 0x73}, {&(0x7f0000000500)=""/42, 0x2a}], 0x7, &(0x7f0000000980)=[{&(0x7f00000005c0)=""/182, 0xb6}, {&(0x7f0000000680)=""/23, 0x17}, {&(0x7f00000006c0)=""/69, 0x45}, {&(0x7f0000000740)=""/139, 0x8b}, {&(0x7f0000000800)=""/90, 0x5a}, {&(0x7f0000000880)=""/245, 0xf5}], 0x6, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) [ 915.313865] device lo left promiscuous mode [ 915.325891] device lo entered promiscuous mode [ 915.341607] device lo left promiscuous mode 2033/05/18 03:47:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000500"}) 2033/05/18 03:47:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"67726530000000000000000000007f00", {0x2}}) 2033/05/18 03:47:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f048f00"}, 0x2c) 2033/05/18 03:47:01 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "ffffffffffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000fffffffe00"}) [ 915.417893] autofs4:pid:18831:autofs4_fill_super: called with bogus options 2033/05/18 03:47:01 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) [ 915.472980] autofs4:pid:18839:autofs4_fill_super: called with bogus options [ 915.497611] device lo entered promiscuous mode [ 915.517206] kernel msg: ebtables bug: please report to author: Wrong len argument [ 915.528295] device lo entered promiscuous mode [ 915.566291] device lo left promiscuous mode [ 915.585589] kernel msg: ebtables bug: please report to author: Wrong len argument [ 915.593632] device lo entered promiscuous mode [ 915.601759] device lo left promiscuous mode [ 915.612169] device lo left promiscuous mode 2033/05/18 03:47:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000100"}, 0x2c) 2033/05/18 03:47:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"6772653000000000000000007f00", {0x2}}) 2033/05/18 03:47:01 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file1\x00', 0x46) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000048f00"}, 0x2c) 2033/05/18 03:47:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000000300"}) [ 915.643899] device lo entered promiscuous mode [ 915.652902] device lo left promiscuous mode 2033/05/18 03:47:01 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000feffffff00"}) 2033/05/18 03:47:01 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) 2033/05/18 03:47:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000600"}, 0x2c) 2033/05/18 03:47:01 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x100) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/126) [ 915.734905] kernel msg: ebtables bug: please report to author: Wrong len argument [ 915.743838] device lo entered promiscuous mode [ 915.753860] device lo entered promiscuous mode [ 915.767247] kernel msg: ebtables bug: please report to author: Wrong len argument [ 915.781553] device lo left promiscuous mode [ 915.815760] device lo left promiscuous mode [ 915.818553] autofs4:pid:18891:autofs4_fill_super: called with bogus options [ 915.842853] device lo entered promiscuous mode 2033/05/18 03:47:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"6772653000000000000000fdfdffff00", {0x2}}) 2033/05/18 03:47:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00048f00"}, 0x2c) 2033/05/18 03:47:01 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 915.859382] autofs4:pid:18896:autofs4_fill_super: called with bogus options [ 915.866750] device lo left promiscuous mode [ 915.887553] device lo entered promiscuous mode [ 915.902238] device lo left promiscuous mode [ 915.926257] kernel msg: ebtables bug: please report to author: Wrong len argument [ 915.973345] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f048f00"}, 0x2c) 2033/05/18 03:47:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000ffffffff00"}) 2033/05/18 03:47:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00`\x00'}) 2033/05/18 03:47:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000600"}, 0x2c) 2033/05/18 03:47:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:02 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x212000) ppoll(&(0x7f00000000c0)=[{r0, 0x1}], 0x1, &(0x7f0000000100)={0x77359400}, &(0x7f00000001c0)={0xfffffffffffffff9}, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x4) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futimesat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{0x77359400}, {r1, r2/1000+10000}}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0600"}, 0x2c) 2033/05/18 03:47:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000600"}, 0x2c) 2033/05/18 03:47:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 916.079574] device lo entered promiscuous mode [ 916.091408] device lo left promiscuous mode [ 916.107221] device lo entered promiscuous mode [ 916.113671] kernel msg: ebtables bug: please report to author: Wrong len argument [ 916.123640] device lo left promiscuous mode [ 916.133373] kernel msg: ebtables bug: please report to author: Wrong len argument [ 916.139111] device lo entered promiscuous mode [ 916.162874] device lo left promiscuous mode 2033/05/18 03:47:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) [ 916.215421] device lo entered promiscuous mode [ 916.230654] device lo left promiscuous mode [ 916.242759] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00@\x00'}) [ 916.286835] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000600"}, 0x2c) 2033/05/18 03:47:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f008f0400"}, 0x2c) 2033/05/18 03:47:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000001100"}) [ 916.405987] device lo entered promiscuous mode [ 916.442637] device lo entered promiscuous mode [ 916.463099] device lo left promiscuous mode [ 916.471724] device lo left promiscuous mode [ 916.503628] device lo entered promiscuous mode [ 916.515690] device lo left promiscuous mode [ 916.527618] device lo entered promiscuous mode [ 916.901281] autofs4:pid:18980:autofs4_fill_super: called with bogus options [ 917.019632] autofs4:pid:18982:autofs4_fill_super: called with bogus options 2033/05/18 03:47:03 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000fffffff500"}) 2033/05/18 03:47:03 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000048f00"}, 0x2c) 2033/05/18 03:47:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000048f00"}, 0x2c) 2033/05/18 03:47:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"67726530000000000000000000000001", {0x2}}) 2033/05/18 03:47:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000001600"}) 2033/05/18 03:47:03 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x80, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000340)='rxrpc\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, r1, r2) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x400, 0x6, 0x8205, 0x4, 0x0, 0xaecc, 0x6, 0x1, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={r3, 0x8}, 0x8) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000200)=""/167) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000003c0)) [ 917.163688] kernel msg: ebtables bug: please report to author: Wrong len argument [ 917.180922] device lo left promiscuous mode [ 917.188730] device lo entered promiscuous mode [ 917.197778] kernel msg: ebtables bug: please report to author: Wrong len argument [ 917.203875] autofs4:pid:19002:autofs4_fill_super: called with bogus options 2033/05/18 03:47:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"6772653000000000000000000000007f", {0x2}}) 2033/05/18 03:47:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000100"}, 0x2c) [ 917.216894] device lo entered promiscuous mode [ 917.225320] device lo left promiscuous mode [ 917.235885] autofs4:pid:19005:autofs4_fill_super: called with bogus options [ 917.245149] device lo left promiscuous mode [ 917.277481] device lo entered promiscuous mode 2033/05/18 03:47:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000100"}, 0x2c) 2033/05/18 03:47:03 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000001800"}) [ 917.302583] device lo left promiscuous mode 2033/05/18 03:47:03 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:03 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000feffffff00"}) [ 917.418495] kernel msg: ebtables bug: please report to author: Wrong len argument [ 917.435257] device lo entered promiscuous mode [ 917.474429] kernel msg: ebtables bug: please report to author: Wrong len argument [ 917.476459] device lo entered promiscuous mode [ 917.514453] device lo left promiscuous mode [ 917.521472] device lo left promiscuous mode [ 917.533861] device lo entered promiscuous mode [ 917.540818] device lo entered promiscuous mode [ 917.547788] device lo left promiscuous mode [ 917.555145] device lo left promiscuous mode 2033/05/18 03:47:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"677265300000000000000000fffffdfd", {0x2}}) 2033/05/18 03:47:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000600"}, 0x2c) 2033/05/18 03:47:03 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x3d) umount2(&(0x7f0000000080)='./file0\x00', 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) quotactl(0xfaef, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000300)="c4e40bb2ff2b4ece8653afae3bc265e885af7af46c2f64d6c478c83eb3b276f8384dc74d4cf7e7d6709858cd460d1cc6b60f9696369e28fa0d58225b3fa091db9ff18c9167c1e8cb29655296a763f0eef2175206819373bfecaac6817f22fe3fe59be7bd3d7ba876676517e46ce7d3b812ba85262d97f100c2efd5e644b5d530696b38e7667a0c6edd514bbda4ed5ba0f9c51ed3557d19d04ddb560b8116d44ba2922da08e513345e99afc81d70e42d4447f00abc9d3337ab1e4a0bff5fa8d87c23035e7ae28e4c9cb3a14712b54517005d321af827acf75e0a5d05e390f566b3251704cdec27374e1ee3c754e540a211fa25b82ce6d2b3ca0aa54fc91") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$dspn(&(0x7f0000000400)='/dev/dsp#\x00', 0x0, 0x400) name_to_handle_at(r1, &(0x7f0000000500)='./file0/file0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="0b000000ffffff7fcc64d1f86d87c445fdaf33eeb5e7a583989ab0b7440a66fceb389e09113236541357493cc49041a39a2198d9c6020bf58520f230c6715cbd78b0dea46ad6c6ed27618325e23008ffc4a2900e87211d8a7845cdf6ca99ffd3c2935888"], &(0x7f0000000580), 0x400) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000540), &(0x7f0000000640)=0x30) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000440)={{0x4, 0x1f, 0x3, 0x2, 0x1, 0x8001}, 0x5, 0x5, 0x8, 0x5, 0x2, "183f4453aeabd68a036cef51609f001a048d7a70a843a7d1edf8888f8cb9ad0e9940620551601bf31813b7dee95c58bd7b536c51947e69f90d57cb1d80b544ab10840899e0343ba20779d562f898983b6f9ef8edc7a670c1e98153e8bf1a17161995a1f91cf6f0238cdef3fc16278abdc4e8612185897fb7c73de3eee1ce8253"}) 2033/05/18 03:47:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000f00"}) 2033/05/18 03:47:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000600"}, 0x2c) 2033/05/18 03:47:03 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "7fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:03 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000500"}) [ 917.631940] kernel msg: ebtables bug: please report to author: Wrong len argument [ 917.645324] device lo entered promiscuous mode [ 917.654985] autofs4:pid:19057:autofs4_fill_super: called with bogus options [ 917.662768] device lo entered promiscuous mode 2033/05/18 03:47:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"677265300000000000000000007f00", {0x2}}) 2033/05/18 03:47:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000100"}, 0x2c) 2033/05/18 03:47:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f8f0400"}, 0x2c) [ 917.681251] kernel msg: ebtables bug: please report to author: Wrong len argument [ 917.684344] autofs4:pid:19057:autofs4_fill_super: called with bogus options [ 917.696477] device lo left promiscuous mode [ 917.711962] device lo left promiscuous mode [ 917.730606] device lo entered promiscuous mode [ 917.748196] device lo left promiscuous mode [ 917.768264] device lo entered promiscuous mode 2033/05/18 03:47:03 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:03 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x4000, 0x0) sendmsg$alg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="48f0850afb61cf409747e608db527375f68bf78641239aec954ea25f1aba919d37d2628e2efe6429c9502532fc820168590cd67b175123d0f4bf06fc710279be928af1c2671e424952cc331a3ff88ccd40512fd32715095c35438ae93a232bf24b2ee1adde911e9717bdafc7564c798f0c32786d328e183029e4d355a69a7d252272e87af11525d0016a4426a362a965c84f10e640c31d6997787f97604504db8c248236be3a7fec24c092a64b15423282a2c83eb3d695f0de30b9dc1daf18a3872ff97ba8fbb52d46e36b0d3d800aacac5de8c914a86d29794b94fd1d419f145e7bd332", 0xe4}, {&(0x7f00000002c0)="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", 0xfb}], 0x2, &(0x7f00000003c0)=[@iv={0xc8, 0x117, 0x2, 0xae, "ca05023f4d9ff2a362914525ec2ff066ab2d9cbad422ee576da156e8a34cc8c9a9cbaecff6a2ecd41caf837e3bbe12db36e66d53910d63e7243e6af2973c91f0fb2c931148f179fcc0c4a080c72b79bd7fda00269b8c8a1aaba9aa3c866f526107e7f3db96788772990ec21ab1daf44a67bbedfdcfccc093a9b6bcd81bee4c9fff81a6b010ed319e39f7b1a5fbcef5758d80b9f62df680ea7653ec1c7fcca2fb89ae587c64d148e253477f817f3a"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x8}, @assoc={0x18, 0x117, 0x4, 0x8fb}, @assoc={0x18, 0x117, 0x4, 0x9}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x70, 0x117, 0x2, 0x58, "a213e245d77190bd0cba401721bb2211b0b6eb538b275a61a35e5b1b9ce1afacb2e8bef9dcdb6c3b43472a749c6534bf7b7fb9040bb6a0a3f9572eed8a18617e82d7aee5f77fefb6c75bab6a7052d0ed2f611f373089ef43"}, @iv={0x70, 0x117, 0x2, 0x56, "235dba87fc67ac13510477a4de7cf9e4bac8097dc9d961cf8e6d94d09b52bcace5ff197478270f663318101f3f73b3b527c8b6ced85c28cb98a94cb11cefdd8a758d004fbc773df24f69ff4db08259ca7d8130d0145e"}], 0x238, 0x40}, 0x800) 2033/05/18 03:47:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000600"}, 0x2c) 2033/05/18 03:47:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000000500"}) 2033/05/18 03:47:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000600"}) 2033/05/18 03:47:03 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f008f0400"}, 0x2c) [ 917.909168] device lo entered promiscuous mode [ 917.935791] kernel msg: ebtables bug: please report to author: Wrong len argument [ 917.945699] autofs4:pid:19090:autofs4_fill_super: called with bogus options [ 917.953858] device lo left promiscuous mode [ 917.963560] autofs4:pid:19100:autofs4_fill_super: called with bogus options [ 917.971880] kernel msg: ebtables bug: please report to author: Wrong len argument [ 917.982293] device lo left promiscuous mode [ 918.000172] device lo entered promiscuous mode [ 918.013077] device lo left promiscuous mode [ 918.026377] device lo entered promiscuous mode [ 918.037770] device lo left promiscuous mode 2033/05/18 03:47:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"677265300000000000000000fdfdffff", {0x2}}) 2033/05/18 03:47:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000048f00"}, 0x2c) 2033/05/18 03:47:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000600"}, 0x2c) 2033/05/18 03:47:04 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0xffffffffffff3888, 0x24b, 0xb1f0, 0x40, 0x0, 0x2, 0x20, 0x0, 0x9, 0x2, 0x3ff, 0x1, 0x8, 0x401, 0x4, 0xffffffff, 0x40, 0x5, 0xa2b, 0xba0, 0x2, 0x0, 0x9, 0x100, 0xd5d, 0xd1, 0x5, 0x3, 0x6, 0xc6, 0x15, 0xf6, 0x8, 0x3, 0x100000001, 0x26, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x100, 0x3, 0x9, 0x7, 0x7fff, 0xfffffffffffffeff, 0x2}, r1, 0x10, r0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x20000, 0x0) 2033/05/18 03:47:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000001600"}) 2033/05/18 03:47:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000300"}) 2033/05/18 03:47:04 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:04 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 918.104244] kernel msg: ebtables bug: please report to author: Wrong len argument [ 918.105341] device lo entered promiscuous mode 2033/05/18 03:47:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) [ 918.166358] autofs4:pid:19123:autofs4_fill_super: called with bogus options [ 918.190662] kernel msg: ebtables bug: please report to author: Wrong len argument [ 918.193210] device lo entered promiscuous mode [ 918.206724] autofs4:pid:19131:autofs4_fill_super: called with bogus options 2033/05/18 03:47:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000048f00"}, 0x2c) [ 918.216332] device lo left promiscuous mode [ 918.230910] device lo left promiscuous mode 2033/05/18 03:47:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000100"}, 0x2c) [ 918.259098] device lo entered promiscuous mode [ 918.293876] device lo left promiscuous mode [ 918.328685] device lo entered promiscuous mode [ 918.337967] device lo left promiscuous mode 2033/05/18 03:47:04 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:04 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:04 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x185000, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000380)=@ethernet={0x306, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)="fa7c87d5df4b2f5d4acd5958ba1fa1a3f6ed2f817dffc18e9dc46a8d0e5d30cf715a135c3cce81ec16c2f7b694e7be1887223a60392ace03d605a9dce9ca9e44ed834397fd1d7d3b68ddd73ee9c6ec65388925a0f0231f94e9dc728615a1daf33a24c0aac79f4af2150a83c003c9350a460341549b7e7f2dc19e2c3b0ac44b4bca3ca06708f95faa9cecbc7b0e44cbfcb23c4695973464f8115aee90061fb5642a2137fa409bbdbef52789cf996987dc5e25ab4062687f53a49aaa420ea1d68033817a68ffa583d8c16265b95d843ba861d5fa6e6d1e082aa8c269dbd79006fb118010dc3649e951ef0711f24897618670dac3aefa40ca", 0xf7}, {&(0x7f0000000500)="e61890225127fe922df81d353239604c53683d413f32329a943cc37c336a890c69807281818bba26c2d96fec23b2292cc16bd5e56c26cead859349d3af8c5b8e27a454f1c2b14b1e648479037d26b165d8553e1a9513fedce5d7183a5a188e1e84a5a7758c6f2812603ca7df4ef0cfa082742b5770f0930eb2decb7fa6b7737d086d62b5b6f3bd327eb6f0193d79d0cfeaf7572361f60028113ecabb55230a2b2ba5743a896f537a", 0xa8}], 0x2}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = accept4$vsock_stream(r0, &(0x7f0000000240)={0x28, 0x0, 0xffffffff, @any=0xffffffff}, 0xfffffffffffffccd, 0x800) sendto(r1, &(0x7f0000000280)="87a20ed1b791fceed8a394b44a61846f12ae468e73f7d39e09e95b9eba44b7b65963808998d504766e8afedfdec1573fc7c747e859d24c04d2bfe9a4080916b742500ede23dcbb55997fcfd807647798b86ab47310849e8b74acf98885601ca0d70e146ea2e282eaccb647adf58ec2c1165f040fa65515cbc66a2e3e10f800c5d0fb34af31317785", 0x88, 0x20000000, 0x0, 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='exofs\x00', 0x4, &(0x7f00000001c0)="943eab495f98f854d5a25cfb11e21bc8cf37a3a83cac27b2823f5eccb00b9897b8d15a4eb91a78ba0bd4de17298bf363dff5b32a882738b3aec5a2fa50a129582be85731b4dc470129534c29ab818eb8") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000600"}) 2033/05/18 03:47:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000ffffffc300"}) 2033/05/18 03:47:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000048f00"}, 0x2c) 2033/05/18 03:47:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000600"}, 0x2c) [ 918.429633] kernel msg: ebtables bug: please report to author: Wrong len argument [ 918.451316] device lo entered promiscuous mode [ 918.470154] autofs4:pid:19159:autofs4_fill_super: called with bogus options 2033/05/18 03:47:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000600"}, 0x2c) [ 918.471343] kernel msg: ebtables bug: please report to author: Wrong len argument [ 918.485351] device lo entered promiscuous mode [ 918.496486] device lo left promiscuous mode [ 918.515097] device lo left promiscuous mode 2033/05/18 03:47:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) [ 918.540321] device lo entered promiscuous mode 2033/05/18 03:47:04 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 918.562262] device lo entered promiscuous mode 2033/05/18 03:47:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000100"}, 0x2c) 2033/05/18 03:47:04 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f00000001c0)="9bc1340f052838522d44270c2eab5dab72186f68eae7727b18aeb4daff47718d3d1cd9ac5fafced02b4aa0dc43cf3d35f489ec27c05d565223804211", 0x3c}, {&(0x7f0000000200)="3446ddb0c09bb32787aa6b20d2e45aa347e1d0aa5fbf08df577865493cbfad5647eb", 0x22}, {&(0x7f0000000240)="ff9a1898f69adf6e76f06d2403726b028d0e7a64bbb6636ab7625c77dc60c6162f651541e1b9a7a1dd8d940a108288883f61ed210f1b9a0193cd3674bf024a73cf7ae06cdf", 0x45}, {&(0x7f00000002c0)="e8404fd578c6e121c2a6e4836ba93be738918ce803698e3b27eea7", 0x1b}], 0x4, &(0x7f0000000500)=[@rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}], 0x38, 0x4000000}, 0x4000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) [ 918.585966] device lo left promiscuous mode 2033/05/18 03:47:04 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 918.621603] device lo left promiscuous mode [ 918.636182] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000600"}, 0x2c) 2033/05/18 03:47:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000500"}) 2033/05/18 03:47:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"67726530000000000000000000fffffd", {0x2}}) [ 918.669362] autofs4:pid:19190:autofs4_fill_super: called with bogus options 2033/05/18 03:47:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000200"}) [ 918.731337] kernel msg: ebtables bug: please report to author: Wrong len argument [ 918.791331] device lo entered promiscuous mode [ 918.827148] device lo entered promiscuous mode [ 918.838243] device lo left promiscuous mode [ 918.855247] device lo left promiscuous mode [ 918.865792] device lo entered promiscuous mode [ 918.878949] device lo left promiscuous mode [ 918.891342] device lo entered promiscuous mode [ 918.897524] device lo left promiscuous mode 2033/05/18 03:47:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000600"}, 0x2c) 2033/05/18 03:47:05 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000005d00)={0x0, 0x1775}, &(0x7f0000005d40)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000005d80)={r2, @in={{0x2, 0x4e23, @rand_addr=0x101}}, 0x2c4c, 0x1106}, 0x90) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:05 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000ffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00 \x00'}) 2033/05/18 03:47:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000600"}, 0x2c) 2033/05/18 03:47:05 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000001600"}) 2033/05/18 03:47:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"67726530000000000000000000007f00", {0x2}}) [ 918.967275] device lo entered promiscuous mode [ 918.981297] kernel msg: ebtables bug: please report to author: Wrong len argument [ 918.989906] device lo entered promiscuous mode [ 918.992271] autofs4:pid:19238:autofs4_fill_super: called with bogus options [ 919.003994] device lo left promiscuous mode [ 919.006309] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"67726530000000000000000000fdfdff", {0x2}}) 2033/05/18 03:47:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00008f0400"}, 0x2c) [ 919.020390] device lo left promiscuous mode [ 919.030608] device lo entered promiscuous mode [ 919.042168] device lo left promiscuous mode 2033/05/18 03:47:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000100"}, 0x2c) 2033/05/18 03:47:05 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xffffffff, 0x10000) symlinkat(&(0x7f00000000c0)='./file1\x00', r0, &(0x7f00000001c0)='./file0\x00') 2033/05/18 03:47:05 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 919.069334] device lo entered promiscuous mode [ 919.078215] device lo left promiscuous mode 2033/05/18 03:47:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000ffffffc000"}) 2033/05/18 03:47:05 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000000000100"}) 2033/05/18 03:47:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) [ 919.218352] device lo entered promiscuous mode 2033/05/18 03:47:05 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xf5eb, 0x10000) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f00000000c0)={0x5, 0x3ff}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) [ 919.247278] kernel msg: ebtables bug: please report to author: Wrong len argument [ 919.257260] device lo entered promiscuous mode [ 919.289425] device lo left promiscuous mode [ 919.295809] kernel msg: ebtables bug: please report to author: Wrong len argument [ 919.311240] device lo left promiscuous mode [ 919.321920] autofs4:pid:19281:autofs4_fill_super: called with bogus options [ 919.326940] device lo entered promiscuous mode [ 919.337244] device lo left promiscuous mode [ 919.347161] device lo entered promiscuous mode [ 919.353976] device lo left promiscuous mode [ 919.361956] autofs4:pid:19283:autofs4_fill_super: called with bogus options 2033/05/18 03:47:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000600"}, 0x2c) 2033/05/18 03:47:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000100"}, 0x2c) 2033/05/18 03:47:05 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:05 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='exofs\x00', 0x3000000, &(0x7f00000001c0)="a6006c09c32c1753248616b9a24196e1e1766df51192820a56cd9ec5f585fa094bb82cdfd2e60023c80ea2ec847daf991ceeaf3e25ad96e0b09f4f6e5fcc3ef9d02b08e509783c") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00`\x00'}) 2033/05/18 03:47:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 2033/05/18 03:47:05 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 919.459251] device lo entered promiscuous mode [ 919.474902] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00048f00"}, 0x2c) 2033/05/18 03:47:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) [ 919.506185] device lo left promiscuous mode [ 919.518444] kernel msg: ebtables bug: please report to author: Wrong len argument [ 919.528488] autofs4:pid:19302:autofs4_fill_super: called with bogus options [ 919.546479] device lo entered promiscuous mode 2033/05/18 03:47:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000048f00"}, 0x2c) [ 919.565048] device lo entered promiscuous mode [ 919.580988] device lo left promiscuous mode 2033/05/18 03:47:05 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:05 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") 2033/05/18 03:47:05 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 919.610321] device lo left promiscuous mode [ 919.623260] device lo entered promiscuous mode [ 919.644944] device lo left promiscuous mode [ 919.691293] kernel msg: ebtables bug: please report to author: Wrong len argument [ 919.747428] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000000000100"}) 2033/05/18 03:47:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000100"}, 0x2c) 2033/05/18 03:47:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000600"}, 0x2c) 2033/05/18 03:47:05 executing program 6: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) getsockname$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f00000001c0)=0x6e) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) pipe2(&(0x7f0000000200), 0x80000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000001100"}) 2033/05/18 03:47:05 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:05 executing program 5: r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 919.849210] device lo entered promiscuous mode [ 919.861067] autofs4:pid:19355:autofs4_fill_super: called with bogus options [ 919.870662] device lo entered promiscuous mode [ 919.877744] kernel msg: ebtables bug: please report to author: Wrong len argument [ 919.891294] device lo left promiscuous mode 2033/05/18 03:47:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000100"}, 0x2c) 2033/05/18 03:47:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000048f00"}, 0x2c) [ 919.899199] device lo left promiscuous mode [ 919.909354] kernel msg: ebtables bug: please report to author: Wrong len argument [ 919.918227] device lo entered promiscuous mode [ 919.930895] device lo left promiscuous mode [ 919.944081] device lo entered promiscuous mode 2033/05/18 03:47:06 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffff7, 0x101c00) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000000c0)=0x7fffffff, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000002c0)={r2, @loopback=0x7f000001, @loopback=0x7f000001}, 0xc) fsync(r0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f00000004c0)) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f00000001c0)=""/232) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000300)=0x3ff, 0x8, 0x1) [ 919.954923] device lo left promiscuous mode 2033/05/18 03:47:06 executing program 5: r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000000f00"}) [ 920.086266] autofs4:pid:19377:autofs4_fill_super: called with bogus options [ 920.102601] device lo entered promiscuous mode [ 920.122536] device lo left promiscuous mode [ 920.130914] autofs4:pid:19387:autofs4_fill_super: called with bogus options [ 920.135047] device lo entered promiscuous mode [ 920.145111] device lo left promiscuous mode 2033/05/18 03:47:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000100"}, 0x2c) 2033/05/18 03:47:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000048f00"}, 0x2c) 2033/05/18 03:47:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000fffffffe00"}) 2033/05/18 03:47:06 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:06 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chroot(&(0x7f0000000080)='./file0\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r0 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@in6={0x0, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x80) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, @dev}]}) 2033/05/18 03:47:06 executing program 5: r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000007fffffff00"}) [ 920.228376] device lo entered promiscuous mode [ 920.239677] kernel msg: ebtables bug: please report to author: Wrong len argument [ 920.248562] autofs4:pid:19407:autofs4_fill_super: called with bogus options [ 920.251741] kernel msg: ebtables bug: please report to author: Wrong len argument [ 920.263772] device lo left promiscuous mode [ 920.269394] autofs4:pid:19407:autofs4_fill_super: called with bogus options 2033/05/18 03:47:06 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000600"}, 0x2c) [ 920.283565] device lo entered promiscuous mode [ 920.291960] device lo entered promiscuous mode [ 920.316137] device lo left promiscuous mode 2033/05/18 03:47:06 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) fcntl$notify(r0, 0x402, 0x80000001) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000600"}, 0x2c) [ 920.335184] device lo left promiscuous mode [ 920.352121] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000001100"}) 2033/05/18 03:47:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"6772653000000000000000000000ffff", {0x2}}) 2033/05/18 03:47:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000048f00"}, 0x2c) 2033/05/18 03:47:06 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 920.389291] autofs4:pid:19421:autofs4_fill_super: called with bogus options [ 920.390274] device lo entered promiscuous mode [ 920.424472] kernel msg: ebtables bug: please report to author: Wrong len argument [ 920.484765] device lo entered promiscuous mode 2033/05/18 03:47:06 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x2, 0x100000000, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x1, &(0x7f00000006c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$sndseq(r1, &(0x7f0000000300)=[{0x7, 0x0, 0x2, 0x9, @tick=0x5, {0x6, 0x4}, {0x1, 0x8}, @control={0xd65b, 0x7f, 0x9}}, {0x2, 0x4, 0x6, 0x4, @tick=0x7ff, {0x6}, {0x7, 0xffffffffffffff81}, @raw8={"ef0fa55e8717ec8d25dc938b"}}, {0x7, 0x5, 0xb10, 0x7, @time={r2, r3+10000000}, {0xc76, 0x3f}, {0x7, 0x695}, @note={0x2880000000, 0x400, 0x5, 0x0, 0x100}}, {0x652, 0xfffffffffffffffb, 0xff, 0xdeb6, @tick=0xffffffff, {0x7f, 0xa97c}, {0x0, 0x8}, @time=@time={r4, r5+10000000}}, {0x3, 0x800, 0x9, 0x401, @time={0x0, 0x989680}, {0x10001, 0x80000001}, {0x99, 0x8}, @queue={0x9, {0x0, 0x80}}}, {0x20, 0x100, 0xd0, 0x7, @time, {0x7fffffff, 0x2}, {0x8, 0x6}, @quote={{0x6a, 0x7}, 0x3}}, {0x8, 0x0, 0x0, 0x6, @tick=0x8001, {0x3, 0x7}, {0x9}, @addr={0x71, 0x365}}, {0x1f, 0x1ff, 0x5, 0xffffffffffffff87, @tick=0x1799, {0x6, 0x9}, {0x7, 0x1fffffffc00000}, @addr={0x8, 0x401}}], 0x180) r6 = socket(0x10, 0x3, 0x0) mq_timedsend(r1, &(0x7f0000000640)="4afe157215330b280bf45ee62b0cce84ea3484c8967145754461", 0x1a, 0x98, &(0x7f0000000680)={0x77359400}) r7 = accept4$inet(r6, &(0x7f0000000280), &(0x7f00000002c0)=0x10, 0x800) ioctl$BLKRRPART(r0, 0x125f, 0x0) getsockopt$inet_udp_int(r7, 0x11, 0x64, &(0x7f00000005c0), &(0x7f0000000600)=0x4) sendmsg$nl_route(r6, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000800)=ANY=[]}, 0x1}, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@local, @in6=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000001c0)) 2033/05/18 03:47:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00008f0400"}, 0x2c) 2033/05/18 03:47:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000000500"}) [ 920.518221] device lo left promiscuous mode [ 920.578404] device lo entered promiscuous mode 2033/05/18 03:47:06 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000600"}, 0x2c) [ 920.604538] device lo left promiscuous mode 2033/05/18 03:47:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"6772653000000000000000000000007f", {0x2}}) 2033/05/18 03:47:06 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x200000, 0x0) fchdir(r0) r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x81, 0x781100) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000240)={0x3, r2}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x202000, 0x0) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f00000000c0)="dd598aeb08789ffe4b3c5183e0297cc7f0dab9ebdc20448d2fdfc17c2f8e6678049244d8b9af97e84c914db87d41225f2ad9ffcb8069d42009f22160aedb2b4d658ad6a822526cbabbe292c026bc635701af4891dd2c4e2f7963465654775630957362d89cb3943a47610a27dc0364be01de4bc522885674") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) [ 920.633889] device lo left promiscuous mode [ 920.640629] kernel msg: ebtables bug: please report to author: Wrong len argument [ 920.658137] device lo entered promiscuous mode [ 920.677426] device lo left promiscuous mode 2033/05/18 03:47:06 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 920.691009] kernel msg: ebtables bug: please report to author: Wrong len argument [ 920.741136] autofs4:pid:19466:autofs4_fill_super: called with bogus options [ 920.777758] autofs4:pid:19474:autofs4_fill_super: called with bogus options 2033/05/18 03:47:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000500"}) 2033/05/18 03:47:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000600"}, 0x2c) 2033/05/18 03:47:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000fffffffe00"}) 2033/05/18 03:47:06 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"6772653000000000000000000000fdfd", {0x2}}) 2033/05/18 03:47:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000008f0400"}, 0x2c) 2033/05/18 03:47:06 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:06 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00ffffffffffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 920.886234] kernel msg: ebtables bug: please report to author: Wrong len argument [ 920.894188] device lo entered promiscuous mode [ 920.907501] device lo entered promiscuous mode [ 920.918128] kernel msg: ebtables bug: please report to author: Wrong len argument [ 920.929083] device lo left promiscuous mode [ 920.938331] autofs4:pid:19497:autofs4_fill_super: called with bogus options [ 920.965275] device lo left promiscuous mode [ 920.969830] autofs4:pid:19501:autofs4_fill_super: called with bogus options [ 920.979578] device lo entered promiscuous mode [ 921.002826] device lo entered promiscuous mode [ 921.010667] device lo left promiscuous mode 2033/05/18 03:47:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000600"}, 0x2c) 2033/05/18 03:47:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\a\x00'}) 2033/05/18 03:47:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000600"}, 0x2c) 2033/05/18 03:47:07 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) 2033/05/18 03:47:07 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:07 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000001600"}) [ 921.112453] kernel msg: ebtables bug: please report to author: Wrong len argument [ 921.125485] device lo left promiscuous mode [ 921.136889] autofs4:pid:19520:autofs4_fill_super: called with bogus options [ 921.142989] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:07 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 921.157456] autofs4:pid:19529:autofs4_fill_super: called with bogus options [ 921.159406] device lo entered promiscuous mode [ 921.175790] device lo entered promiscuous mode [ 921.188503] device lo left promiscuous mode [ 921.203581] device lo left promiscuous mode 2033/05/18 03:47:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000600"}, 0x2c) 2033/05/18 03:47:07 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x2, 0x80000) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000001c0)=""/176) 2033/05/18 03:47:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00@\x00'}) [ 921.232717] device lo entered promiscuous mode [ 921.252610] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000048f00"}, 0x2c) [ 921.290444] device lo left promiscuous mode 2033/05/18 03:47:07 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 921.314856] kernel msg: ebtables bug: please report to author: Wrong len argument [ 921.336339] autofs4:pid:19547:autofs4_fill_super: called with bogus options [ 921.346155] device lo entered promiscuous mode 2033/05/18 03:47:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00@\x00'}) [ 921.381508] device lo left promiscuous mode 2033/05/18 03:47:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000048f00"}, 0x2c) 2033/05/18 03:47:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) [ 921.402335] autofs4:pid:19558:autofs4_fill_super: called with bogus options [ 921.429088] device lo entered promiscuous mode 2033/05/18 03:47:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000600"}, 0x2c) 2033/05/18 03:47:07 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:07 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) [ 921.468288] device lo entered promiscuous mode [ 921.497694] device lo left promiscuous mode [ 921.546545] kernel msg: ebtables bug: please report to author: Wrong len argument [ 921.567594] device lo entered promiscuous mode [ 921.569646] autofs4:pid:19580:autofs4_fill_super: called with bogus options [ 921.588626] kernel msg: ebtables bug: please report to author: Wrong len argument [ 921.607194] autofs4:pid:19583:autofs4_fill_super: called with bogus options [ 921.614744] device lo left promiscuous mode 2033/05/18 03:47:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000fffffff500"}) 2033/05/18 03:47:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000048f00"}, 0x2c) 2033/05/18 03:47:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"677265300000000000000000000000ff", {0x2}}) 2033/05/18 03:47:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000048f00"}, 0x2c) 2033/05/18 03:47:07 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000001f00"}) 2033/05/18 03:47:07 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:07 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x3cc, 0x3e3, 0xffffffffffffffff, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ftruncate(r0, 0x1) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) [ 921.709477] device lo left promiscuous mode [ 921.723485] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000100"}, 0x2c) 2033/05/18 03:47:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000008f0400"}, 0x2c) [ 921.749652] device lo entered promiscuous mode [ 921.763481] autofs4:pid:19606:autofs4_fill_super: called with bogus options [ 921.766338] device lo entered promiscuous mode [ 921.776726] kernel msg: ebtables bug: please report to author: Wrong len argument [ 921.791892] device lo left promiscuous mode [ 921.816460] device lo left promiscuous mode [ 921.832942] device lo entered promiscuous mode 2033/05/18 03:47:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000100"}, 0x2c) 2033/05/18 03:47:08 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:08 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000008f0400"}, 0x2c) 2033/05/18 03:47:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\a\x00'}) 2033/05/18 03:47:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={"677265300000000000000000000000fd", {0x2}}) 2033/05/18 03:47:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\b\x00'}) 2033/05/18 03:47:08 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0xf5, r1, 0x1, 0xff, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000340)={@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, 0x4, 0x1, 0x3, 0x3}}, {&(0x7f0000000140)=""/5, 0x5}, &(0x7f0000000240), 0x13}, 0xa0) connect$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) bind$netrom(r0, &(0x7f0000000880)=@full={{0x3, {"8ecf7636a78680"}, 0x6}, [{"4a496516086519"}, {"c123ebb6240a05"}, {"bfc8b4e6468550"}, {"e3e2b745f68aff"}, {"27b5ef268a0fc0"}, {"c360c74ec99236"}, {"cd945679ec36d9"}, {"db596500f185f2"}]}, 0xffffffffffffff09) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)=[&(0x7f0000000400)='team0\x00', &(0x7f0000000440)='}\'\x00', &(0x7f0000000480)='team0\x00', &(0x7f00000004c0)=']cpusetself\x00'], &(0x7f00000007c0)=[&(0x7f0000000540)='team0\x00', &(0x7f0000000580)='-cgroupselinux-nodev\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='[\x00', &(0x7f0000000640)='team0\x00', &(0x7f0000000680)='+\x00', &(0x7f00000006c0)='/dev/dsp#\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='/dev/dsp#\x00', &(0x7f0000000780)='team0\x00']) [ 921.981993] device lo entered promiscuous mode [ 921.986733] kernel msg: ebtables bug: please report to author: Wrong len argument [ 922.010252] autofs4:pid:19636:autofs4_fill_super: called with bogus options [ 922.030941] device lo left promiscuous mode [ 922.046957] kernel msg: ebtables bug: please report to author: Wrong len argument [ 922.048133] autofs4:pid:19650:autofs4_fill_super: called with bogus options [ 922.062849] device lo left promiscuous mode 2033/05/18 03:47:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000048f00"}, 0x2c) 2033/05/18 03:47:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) [ 922.083761] device lo entered promiscuous mode 2033/05/18 03:47:08 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000100"}, 0x2c) 2033/05/18 03:47:08 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 922.116743] device lo left promiscuous mode 2033/05/18 03:47:08 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000"}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 922.153526] device lo entered promiscuous mode 2033/05/18 03:47:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000ffffffc000"}) 2033/05/18 03:47:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000001100"}) [ 922.209812] autofs4:pid:19665:autofs4_fill_super: called with bogus options [ 922.229712] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000000100"}, 0x2c) 2033/05/18 03:47:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) [ 922.262948] autofs4:pid:19675:autofs4_fill_super: called with bogus options [ 922.295492] device lo entered promiscuous mode [ 922.302656] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000600"}, 0x2c) [ 922.321528] device lo left promiscuous mode 2033/05/18 03:47:08 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffffff, 0x7, 0x1, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4000, 0x0) renameat2(r1, &(0x7f00000003c0)='./file0/file0/file0\x00', r0, &(0x7f0000000400)='./file0/file0\x00', 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000500)=0x2) ioctl$KDMKTONE(r0, 0x4b30, 0x99) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000340)=0x10001) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000440)={[0x6000, 0xf004, 0x3000, 0xfffffffffffffffd], 0x1, 0xa0, 0x7}) acct(&(0x7f0000000000)='./file0/file0/file1\x00') statx(r0, &(0x7f0000000100)='./file0/file0\x00', 0x6100, 0x4, &(0x7f00000001c0)) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='sysv\x00', 0x1, &(0x7f00000001c0)) [ 922.359776] device lo left promiscuous mode [ 922.386787] device lo entered promiscuous mode [ 922.401293] device lo left promiscuous mode [ 922.428936] device lo entered promiscuous mode 2033/05/18 03:47:08 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000048f00"}, 0x2c) 2033/05/18 03:47:08 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)={0x1, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) 2033/05/18 03:47:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000600"}, 0x2c) 2033/05/18 03:47:08 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mq_unlink(&(0x7f0000000000)='ppp0trusted\x00') r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0x20000) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000080)={0x1ff, 0x1000, 0x8, 0x5, 0x3}) 2033/05/18 03:47:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00 \x00'}) 2033/05/18 03:47:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000048f00"}, 0x2c) [ 922.555494] kernel msg: ebtables bug: please report to author: Wrong len argument [ 922.586604] device lo entered promiscuous mode 2033/05/18 03:47:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:08 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x401, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000000c0)={0x2, 'gre0\x00', 0x3}, 0x18) [ 922.620128] kernel msg: ebtables bug: please report to author: Wrong len argument [ 922.622110] device lo left promiscuous mode 2033/05/18 03:47:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000048f00"}, 0x2c) [ 922.691626] device lo left promiscuous mode [ 922.699861] autofs4:pid:19735:autofs4_fill_super: called with bogus options [ 922.706157] device lo entered promiscuous mode 2033/05/18 03:47:08 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:08 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x0, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 922.732508] device lo entered promiscuous mode [ 922.736324] autofs4:pid:19742:autofs4_fill_super: called with bogus options [ 922.744880] device lo left promiscuous mode [ 922.766744] device lo left promiscuous mode [ 922.788969] kernel msg: ebtables bug: please report to author: Wrong len argument [ 922.829545] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000600"}, 0x2c) 2033/05/18 03:47:09 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x80247009, &(0x7f0000000040)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) 2033/05/18 03:47:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000ffffffc300"}) 2033/05/18 03:47:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000600"}, 0x2c) 2033/05/18 03:47:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000300"}) 2033/05/18 03:47:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x8}}) 2033/05/18 03:47:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x0, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:09 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 922.989510] device lo entered promiscuous mode [ 922.999656] autofs4:pid:19772:autofs4_fill_super: called with bogus options [ 923.007787] kernel msg: ebtables bug: please report to author: Wrong len argument [ 923.021621] device lo entered promiscuous mode 2033/05/18 03:47:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x7f000000}}) 2033/05/18 03:47:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000000600"}, 0x2c) 2033/05/18 03:47:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000048f00"}, 0x2c) [ 923.036926] device lo left promiscuous mode [ 923.042951] kernel msg: ebtables bug: please report to author: Wrong len argument [ 923.043070] autofs4:pid:19778:autofs4_fill_super: called with bogus options 2033/05/18 03:47:09 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 923.083095] device lo left promiscuous mode [ 923.102294] device lo entered promiscuous mode [ 923.133623] device lo entered promiscuous mode 2033/05/18 03:47:09 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x141000, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x16) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000200)={@l2={0x1f, 0x5, {0x3000000, 0x1, 0x22, 0x4, 0x92, 0x33}, 0x7fff, 0x7}, {&(0x7f0000000100)=""/10, 0xa}, &(0x7f00000001c0), 0x25}, 0xa0) 2033/05/18 03:47:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x7f00}}) 2033/05/18 03:47:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000300"}) 2033/05/18 03:47:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x0, 0x6, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000100"}, 0x2c) [ 923.161313] device lo left promiscuous mode [ 923.176720] kernel msg: ebtables bug: please report to author: Wrong len argument [ 923.246694] kernel msg: ebtables bug: please report to author: Wrong len argument [ 923.253157] autofs4:pid:19800:autofs4_fill_super: called with bogus options [ 923.274415] device lo left promiscuous mode [ 923.309591] autofs4:pid:19800:autofs4_fill_super: called with bogus options [ 923.316387] device lo entered promiscuous mode [ 923.335736] device lo left promiscuous mode 2033/05/18 03:47:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000600"}, 0x2c) 2033/05/18 03:47:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000f5ffffff00"}) 2033/05/18 03:47:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0xfffffdfd}}) 2033/05/18 03:47:09 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000600"}, 0x2c) 2033/05/18 03:47:09 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x140, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000380), &(0x7f00000003c0)=0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) rmdir(&(0x7f0000000080)='./file0\x00') prctl$intptr(0x1f, 0x0) r2 = dup2(r0, r0) recvfrom(r2, &(0x7f00000001c0)=""/174, 0xae, 0x10000, &(0x7f00000000c0)=@ipx={0x4, 0x8, 0x1, "23396b1f6d51", 0xdc3b}, 0x80) r3 = gettid() fcntl$setown(r0, 0x8, r3) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x9, 0xa4, 0x1, 0x5, 0x0, 0x9, 0x40, 0x8, 0x80000000, 0x1, 0x2, 0x7ff, 0x6, 0x2, 0x0, 0x3, 0x8, 0x4, 0x4, 0x5, 0x8, 0x80000000, 0x7, 0x3, 0x16, 0xd0, 0x9, 0x5, 0x1, 0x0, 0x4, 0x5, 0x7f, 0x8, 0x80000001, 0x1, 0x0, 0x9, 0x3, @perf_bp={&(0x7f0000000280), 0xf}, 0x400, 0x0, 0x5, 0x3, 0x1, 0x0, 0x8f}, r3, 0x7, r0, 0x8) 2033/05/18 03:47:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x5, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000600"}) [ 923.450794] kernel msg: ebtables bug: please report to author: Wrong len argument [ 923.454660] device lo entered promiscuous mode [ 923.482975] device lo entered promiscuous mode [ 923.491453] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x7f00000000000000}}) 2033/05/18 03:47:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000600"}, 0x2c) 2033/05/18 03:47:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000048f00"}, 0x2c) [ 923.510333] autofs4:pid:19840:autofs4_fill_super: called with bogus options [ 923.519398] device lo left promiscuous mode [ 923.533651] device lo left promiscuous mode [ 923.544188] autofs4:pid:19842:autofs4_fill_super: called with bogus options 2033/05/18 03:47:09 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000ffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:09 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) accept(r0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x40000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0x50, &(0x7f00000001c0)}, 0x10) [ 923.580650] device lo entered promiscuous mode [ 923.598776] device lo left promiscuous mode 2033/05/18 03:47:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000001100"}) [ 923.623890] device lo entered promiscuous mode [ 923.637421] device lo left promiscuous mode [ 923.663813] kernel msg: ebtables bug: please report to author: Wrong len argument [ 923.697764] autofs4:pid:19858:autofs4_fill_super: called with bogus options [ 923.726350] device lo entered promiscuous mode [ 923.731335] kernel msg: ebtables bug: please report to author: Wrong len argument [ 923.746835] autofs4:pid:19868:autofs4_fill_super: called with bogus options [ 923.759364] device lo left promiscuous mode [ 923.771168] device lo entered promiscuous mode 2033/05/18 03:47:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000008f0400"}, 0x2c) 2033/05/18 03:47:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x5, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0xfdfdffff00000000}}) 2033/05/18 03:47:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000000600"}, 0x2c) 2033/05/18 03:47:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00`\x00'}) 2033/05/18 03:47:09 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/zero\x00', 0x290c02, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x10, r0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x10000000000004) syz_mount_image$cifs(&(0x7f0000000080)='cifs\x00', &(0x7f00000000c0)='./file0\x00', 0x100, 0x2, &(0x7f0000000100)=[{&(0x7f00000001c0)="3bdb9aa00f3e93e011ae1422b1cc0e3c8fa6b5132f7d9b637f9026dd2338cfc393ed6edfadccb496f4326edf2e30ebd335c114ef4d26827dc84d11cd2aab0e5f43dc5984f32848e1591487346f6e7983a6376ccf467793844aa008afe35dd869848163479f99b46851d0f460566b300c0c8fed981f87a5bfcdcf23276ee293559375091b9edfb0f89b704e78dfd9c5f3b8cfc15f540406cc0b2d8c23e2a958c07ee06a8588001f9dae97f783", 0xac, 0x81}, {&(0x7f0000000280)="ec2883c94794dcdb3a1773f886d23287ff910d014a14b5a0661ca4251ec6093b666313d4b06a209049564662c9ee371005530b939e0fbfdbced4a8e5f072f25f5dbbc7522c23", 0x46, 0xcb3}], 0x1, &(0x7f0000000300)='selinuxmime_typenodevsecurity\x00') mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) sched_yield() recvmmsg(0xffffffffffffff9c, &(0x7f0000000cc0)=[{{&(0x7f0000000340)=@l2, 0x80, &(0x7f0000000740)=[{&(0x7f0000000400)=""/250, 0xfa}, {&(0x7f0000000500)=""/206, 0xce}, {&(0x7f0000000600)=""/156, 0x9c}, {&(0x7f00000006c0)=""/86, 0x56}], 0x4, &(0x7f0000000780)=""/108, 0x6c, 0x8}, 0x100000001}, {{&(0x7f0000000800)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000880)=""/115, 0x73}, {&(0x7f0000000900)=""/163, 0xa3}, {&(0x7f00000009c0)=""/179, 0xb3}, {&(0x7f0000000a80)=""/35, 0x23}, {&(0x7f0000000ac0)=""/140, 0x8c}], 0x5, &(0x7f0000000c00)=""/167, 0xa7, 0xff}, 0x8}], 0x2, 0x0, &(0x7f0000000d40)={0x0, 0x1c9c380}) r2 = creat(&(0x7f0000000e80)='./file0\x00', 0x1) unlinkat(r2, &(0x7f0000000ec0)='./file0\x00', 0x200) getsockopt$inet6_int(r1, 0x29, 0x800000000046, &(0x7f0000001180), &(0x7f0000001140)=0x4) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000001240)=0x13, 0x2) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000001100)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000011c0)={[], 0x9, 0x8000, 0x0, 0x4, 0x200, r3}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000f80)={0x0, 0xe1, "a6f88ae0cf734a10ebddd1026421620ff78f8a822fcfceb18f238b4c7c9bfd35ac37e97fa669c2f33b878e77ae5f5ae5c6f7a8fb11e836635a9f5bafdb3b367a9406adaba084546b6596a733c8ed2ca04c2fa598db8ed635967c1881dfebe6ed5009a03a6acb82a74f75940a4061d82d31607b6d8fde8f6240f9574f97f786551612ac112d6e7e476dd3ec4868e690fc7b86f48c5dbef7703b341b3308b501992d71d4514fc4af185e5dcc3cd4d679be2e341c8c3cfc716a8608ed5bae4e675140e64bfed04e651a6d997e3c2cf3c712b3900c6ecc1aca11737e6402baf4086f99"}, &(0x7f0000001080)=0xe9) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000f00)={r4, 0x62, "5845262080e679cc88372d13da6c786b60b0df92c111028eb5199ba97037f7fb93f1ba4ae885892e8416bdc98d6866bf67c6f34ee38f712393790e1d9350d546df3138519995f9173851b7918b2b453c42c97774197e7c251f584b4bbffeb2f54b3a"}, &(0x7f0000000e00)=0xfffffffffffffe50) connect$inet(r1, &(0x7f0000000dc0)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) openat$autofs(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/autofs\x00', 0x20a080, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000e40)={r5, 0x8, 0x3, 0x0, 0x3}, 0x14) 2033/05/18 03:47:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000c3ffffff00"}) 2033/05/18 03:47:09 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 923.876494] kernel msg: ebtables bug: please report to author: Wrong len argument [ 923.889854] device lo entered promiscuous mode [ 923.892596] autofs4:pid:19877:autofs4_fill_super: called with bogus options [ 923.901773] device lo left promiscuous mode [ 923.905347] kernel msg: ebtables bug: please report to author: Wrong len argument [ 923.921214] device lo left promiscuous mode 2033/05/18 03:47:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000048f00"}, 0x2c) [ 923.928736] device lo entered promiscuous mode [ 923.935702] autofs4:pid:19901:autofs4_fill_super: called with bogus options [ 923.948293] device lo entered promiscuous mode 2033/05/18 03:47:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000048f00"}, 0x2c) [ 923.975392] device lo left promiscuous mode 2033/05/18 03:47:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x100000000000000}}) 2033/05/18 03:47:10 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 924.013628] device lo left promiscuous mode 2033/05/18 03:47:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:10 executing program 6: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 2033/05/18 03:47:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000600"}) 2033/05/18 03:47:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000600"}, 0x2c) [ 924.103286] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0xfdfdffff}}) [ 924.147655] autofs4:pid:19926:autofs4_fill_super: called with bogus options [ 924.163661] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000600"}, 0x2c) [ 924.199967] device lo entered promiscuous mode [ 924.249083] device lo entered promiscuous mode [ 924.263130] device lo left promiscuous mode [ 924.283944] device lo left promiscuous mode [ 924.301177] device lo entered promiscuous mode 2033/05/18 03:47:10 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000600"}, 0x2c) 2033/05/18 03:47:10 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8, 0x200) ioctl$KVM_SMI(r0, 0xaeb7) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xffffffff, 0x400) 2033/05/18 03:47:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000100"}, 0x2c) 2033/05/18 03:47:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) 2033/05/18 03:47:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x1000000}}) 2033/05/18 03:47:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000f00"}) [ 924.326338] device lo left promiscuous mode [ 924.334412] device lo entered promiscuous mode [ 924.354775] device lo left promiscuous mode 2033/05/18 03:47:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000048f00"}, 0x2c) [ 924.422706] device lo entered promiscuous mode [ 924.428008] kernel msg: ebtables bug: please report to author: Wrong len argument [ 924.451185] autofs4:pid:19967:autofs4_fill_super: called with bogus options [ 924.462227] device lo left promiscuous mode 2033/05/18 03:47:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000600"}, 0x2c) 2033/05/18 03:47:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty=0x7f00}}) [ 924.480992] device lo entered promiscuous mode [ 924.487744] kernel msg: ebtables bug: please report to author: Wrong len argument [ 924.497902] device lo entered promiscuous mode [ 924.508825] autofs4:pid:19975:autofs4_fill_super: called with bogus options [ 924.516564] device lo left promiscuous mode [ 924.529809] device lo left promiscuous mode 2033/05/18 03:47:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 924.554727] device lo entered promiscuous mode 2033/05/18 03:47:10 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:10 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0xc000, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000340)={0x6}, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="691b1c52adacf5dc7b55df4fecf375a3a2ebd7fa19cb6f119751ed05fd3076761e39ac6e6480bd82b8e7fd0d880cf79706ea8fffb9944eec423864f2d16798d7df8eebf1671ef801b1326dc57c2c6ca02ebb933562f1aadcd6235e596108ec085de24fccff81f744f325aa645f0d66393f4aaa0bddb3d84049b914d357af5c61495738393841808b0189f4dc5180b6464f35c9133a56affbe656d1e02dbc5b02091f6c4c3f1586f1b23465d7020aee9125d4ffdef494caeb3d2a7914b747aea2b8d032d69b4e4cff877f98d03ae149a06d76692bc07752dd77638144735ae94e03ec664b3ca5bb", 0xe7, 0x1}], 0x4000, &(0x7f0000000380)=ANY=[@ANYBLOB="66696c655f756d61736b3d3533013315302c706172743d32303d002c756d61736b3d36102c00"]) fcntl$setstatus(r0, 0x4, 0x5828a68d5fcd7b92) 2033/05/18 03:47:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000000000000100"}) 2033/05/18 03:47:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000600"}, 0x2c) 2033/05/18 03:47:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 2033/05/18 03:47:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty=0xfffffdfd}}) [ 924.672709] kernel msg: ebtables bug: please report to author: Wrong len argument [ 924.705309] device lo entered promiscuous mode [ 924.731011] autofs4:pid:20007:autofs4_fill_super: called with bogus options [ 924.735958] kernel msg: ebtables bug: please report to author: Wrong len argument [ 924.754896] device lo left promiscuous mode [ 924.766803] device lo left promiscuous mode [ 924.771264] hfs: unable to parse mount options [ 924.795971] device lo entered promiscuous mode [ 924.799283] autofs4:pid:20016:autofs4_fill_super: called with bogus options [ 924.809757] device lo entered promiscuous mode [ 924.839603] hfs: unable to parse mount options [ 924.857338] device lo left promiscuous mode 2033/05/18 03:47:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000000100"}, 0x2c) 2033/05/18 03:47:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000600"}, 0x2c) 2033/05/18 03:47:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty=0x100000000000000}}) 2033/05/18 03:47:11 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000001600"}) 2033/05/18 03:47:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:11 executing program 6: syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file1\x00', 0x2000009, 0x9, &(0x7f0000001700)=[{&(0x7f00000001c0)="47b9682231758a4168d22853bc105e14dd70756435abc687a1502a70e9283d128ef1d53a20b8974b1f2cf5add17f02b3bbc18dd157ccf13c3588ef274bc5177a3556ffb7d2fac21fa22a53e07cad21eb894ba293831f8e8bb90fd3cab90809fa4b87da64468e8124b7b4094a82cca02d7b1c9da02709f7f6ab32d84ac292fc9a5bcf2637", 0x84, 0x1}, {&(0x7f0000000280)="00618d7ee997cc2612acd6c2e7704236a96f660ba833e520539de0b259a0f2176b38a4644bdb6393cfbe881a2065d8777f4e6eb9ce16ac3af772c1afa99a6785fc620948fa803303f5285175a00bee76ac4c6aea5325becd46236cabb4dddc1959a8912dfb872a59539d3a49723e29fd4539185cf21d57405c353c2b585ae2f8376b015471585b274854149993824219059619383dcbb50b2b0899979d7163787389c94b312a", 0xa6, 0x5000000000}, {&(0x7f0000000340)="9012519f11318d68ecfa0c37dc347fca7c7f4103faa37573dc7fae37f00b3b43aba4b447bccd2ed832d9816ba6bd763d86a066a5abe6c464fc54a646b186a408156ae96f2185d68ebfa1f19c7f1b9ec2e2e85c525e7adaaa3c14a0580e9d1bdb7b65269931c85f3338399c7cd8963a394dba992ab3da669182e80db9e81c5714b0301ad53ab64f9db9869f721ef3", 0x8e, 0x80}, {&(0x7f0000000400)="b21da10527cbca50b3e1306756e070d393f39299a93d386b340090d760cd4683e9ba1ac673ecef6f35192ed95cebfeec3abf8961f14277e529db4de5eb703fab9d9befbedb58e626de0a42869c4fdb0a9f0b32672510482aac8ed9b03502f6c9", 0x60, 0x1}, {&(0x7f0000000480)="f107631f791d04a353daff6c440bb8b81688c77eedcb1c248538f0c7da92377efae72b35c9848fc30dbb27bc2d44a1e0ac7a4ca416d3f870581be20b49a73db6176d45178eb1104fcee9f85355d28ec7ff48d2c3340a18baee2438924f4c7248697058d44ad10fa81775f510013ccb7353d1bdbe05ce45a34753b3e97fdacd209c6621f44921855232bcd4b1185d4d53486a400ec9ba7a9da1dae3caba5726c77c16e9aec82d36d5c0dafb0decc73c299959cc928831c9e45f5a6b5f19", 0xbd, 0x3ff}, {&(0x7f0000000540)="3a47c7d9eeb7cfda6d63539e480f27309a1101504ac79e525820795d974b0153cd3459290ec149d6e6309d0890c046903ee9a597d68bd20e28907785e9369b0585fd9fed49ee12366b24ea69a6e44039d2c596d04f612ac597a9f30188c7f07c330434807856470736c773aa52410e2d00f090177e1383e37698b57940fd8fbe1b6912a995e6971774b0d74eb5dea890013ada9bff13133f29f795e738d762d585aa2aec7b8c258c5c834f7de93bd5538cd50a4b8de9d18faf73bb7e8e146862b9160271752ce5c2004673de12a4a894afc73039f721d106bfa4fed9ec725679b2299c227868a36babf3a5e31ad8cb97247f95509a8438218d204bc7b43448f8afcafbacbf8da399b6211e163b582932cf64faa13f803ab8e7274b70f55cbf574b704cb79fe78124f2cb3e6c602da0ed66fa11b9db2b624ffdb1fbeebc72f1aee61f59792ac91d6cb766c8e2bae9c67266534323d60409d8a95813599ebf131995bdc4820b0eea8bb6da20d92a6415d667a344df1e144506e38fae99895d8494ca50cb9bb78946ea0987e1e026cfd640f31d60dbfdfe0c989532a2deb1d457c695a58eb49a6b581ff7e20e1eafb7c52ef2aa3062dc4266b8c3db7e37a81f055ae24fe2c573491716308f2036cb332a3c5a296f1d5380758dffb65de1232a325aa4ff9619314a77a39586a347abb0a660916d17c05b0ab8efdef35d163bef229da7cd970b45aa8674ed00731c85733a173e52114f60a80d7e66d6be84382fa24bb72297b775f19997053a6fb6b0042679d2e811269b69a2d84bb94754560ff5cd243bbaebb4e9182a8c264a54ba4ffa2277cb7fb3e48ae3c3b23767e8be312001b92d2d32daa5de763cfcf65b69c6f0ae2b960e0e4aa96143ab3037b8242cb7e20ac1cc52a168ea2b3780973f5acfedc37d6fe7a2268a986f7b810dcb16c1d45b3d930baaca0f3478bc7f9c48c3f10e298b2b75dd16c431f0c9eae396e69f33f932272ba8b9244a9d803785d178b64c064a736761d9f72d8eafe60960335bf245a66cd30504eb98ea3ed70513bfcbba34947e9a952d4589a09b2a6edc1f0e862c0bbb59934d819714732d7146511142ae72b11924f4173935e7a87e0231edd5f32d41c3877c456b0dc4dab4d028e1c35213e85b8ed847f7583b04145c28067dd8a36e0b8a8f3ed54dccf09c622c22a61a4cba8b5570ed0ba54bd7eeff890347a9ed73773e41872399e5d04da241e863f065b4cf6cb2145dc59d886cebb8281e3b1e774eadf6ccce530fe99d98e5c51a1ddd1b7aa87e03b7e8dd326e54b14b7dd4e2d7e9126b44f750d54363c7b4dd343aaf80b6e1aed3e8ddd0cfd93a08d60aa3e750ae81eb0150e7cae9c30efbfb759b9c77074abdfe2b2d2c2fd00e2efc4b1756160f1feb20e2371591c630300a9be6630648d00310832d1de1b5b6e816914fd92232350186658082a9491d94e53c78d63b1e36d6b4395beff1641965576b25fe54778c6e0c2e6ac508df49365b2a301d9d5e1707f1d36bc422bbd8fa5b3b6851a9028dd84feb8cdfdf4cc00cce670f46bb2f6795482db4412a06d7514fbf4de8e4c5d1fff661f8a5bff37372c31a86fcfec3d7e64e058970a35586d1e3331b12fc6c455e4cac63000d3e1df0dea2f024309de91799a5190c563ef3a8db923e5997072f91962e430f288729a3ab6df59f618acd9c4e08aa873c2b22f9d4deee68dcb391878c4a24dac62b4201f884353af55ff92b4d44fb1702a1e83ab2dd7f5c69caa8b2a82a62adc46e2ade1cc0c8873eb836a9838f5db8235cdcf10465d8796fb112e037883fadb92978a8f6401d7b4fff49fa32762e6b66402fbdc8de6f9f02e3d75b2051ba9275c2ddd0b25db59966b550839b9add51cf6912a428a1d19cf0a26302a0dc1242c9357aa3b48fcfe6ec3e30d362f086b74ebb6cce92fa72ca9f4e7de82c5da1e2b27058e994fd32ff0108b9e9392c49a123c2256148b748c7c0853f1d525cc96425737e67953546036e8a458c55a4e767156966246db7455f30ba2d28ede6720aa9b96b164ef6dff8e5ed771c9d3c791bfd27112ceb555b6917a0cc54c0e8ed7bd5de6c0a5dc543a2374965a5e452e7ac47b2e46b1f34a3ad88a356c5f9a053e5b49a87ad55d0ba9bd71248ac699007951c181f765cf0a29f7050237ba1d364a01cea11b9253f155930515fe5c815590f87f4324fb39a276e29d0eb4a4a1a41172f753b2b33637be6a74ca1d6864e7ee96284f1da1bc9b4cca885a07165d2b06f1700991c3f0f05d8e4c1a67386cdfaf3f7801d90350469f2192240b638e3732f016c4f510b0bd1ade9d6243122874c9246ccd6b054b9fc86768e76c617a4f251806df8808b78d5e526d78d31f1bd21ec1ffd6ed9a2fd87ef05fc639577e284c7b3d576348b7dfd008f97507555a1289c10810abad69cdec3bdb6ec6d7e95e1380e709ad44671515a2cee871a5a4a5891d05bb0503e78d7400e7ca7b1514753f5ea64a3c20e1059d34a71baef6b13adaa23a8426340932952a207a4dfdaad9f2f1c45bccbe35290042a3ded72834b5ba1cc3ee4e69714a7f10cc1d8ec2fedef203ac9f52bd4e9d41dce22fc388f463143b918b0ed09b2bfe5b04ffe4900e9fc42578d620d9ae450f284df2f2400c28bd4cbf4f19e8218897489f7a1ddfcc67bb31d702813d0537fb8f2621c732c664fda6f312917307aabd391c1314583dc19c255249d880d0a53633cc7111261f5f5c2ba931221225d15c58889da2e0d03ffea2199a1236872e4732e36cfc685fd9ad2821fa4092efe489d4f0c807cd2f783da0d696a9eb8089cdfcc77a0269ac73705fa34d2e38c8e3811e06b0cd97724ae7e054ec24685857c46ca5309fd5639af685f5089117a54708a8e7899a7d6dd1d57638ebe9159208c0f3f1923411b53c89d572d71a8203ebba7a5f792ae5b71c63080394941abdbb6df3b7267bd3e179a37d21f35145f77965cc025e8f6d9e22be6de41c605bec44d97f7f9fb68d9077e185b7703bffe3d84c043a85ad1f76563a7bfddad17dd9872b9c6e8dc6af355d502a74fc0dbadf8c2a889dead678d6d7e7e4fab5c5c7bab61521f3397b89401c67c4646ffb952c2d6fce9dd3877e511640dc254af52302835fa872efd61fb08f6f76b3e2ad727d164fe966fec07a9f92d9b3fd271af14ffac3173743ea2041f89caa7e319be58b48f126d423eb7ca8c18b872f3b55d5b61745fe96d9cfd969810cd7b732865440d7582422ee881e0db00633ed585148e7855ff21deedef49fe792ed86e48952e38e34ac62c87a2d7fd8cd70ef102b8197298e7952c12ecf8b402978c308987ba831bc55ce223b805910d849c76e14425b94be1ce7a145309878d4e8e20a40699e816f09e9bd9d51679379b5e1743e7118e42aefe301bdd1c520630e6a3c3452b85897e7a9ed40c58e27510cb9d7a94c4821590cb85173cadbfb137960099650f3b9012a21e7c98a291431e0aa954999da3b45adb1802383a70e63001b3f2326ab99dbff1280cfa2776bb13689352fb2aa68a5761b2e2196ef9d39dcc68eaa12ac0d33ef3a5bac27f1ee1dfee456c27c8ac17ccd97f559facc04ed34b8514d7bb7127fce8c49baa00958331671d9690d72881a3b812f56e7e7aae8382e3deb413d615a40ca25bc0e6ccd98797420d019eca18b0c1665321690e02860be0d48e4752847853a2058911a73208e64f770f0d37c9e61965e07af2b5fa6cd525875c989543d9596822eb3027def1dd4db2fe2625f75609c2dcf429df178ec8cfbf6326cc35e7a690df764fe383866930e56e21e264c5f0e15c1324f21a482f01b2da0c5aded5b5b37bf01fd8a58f785c0657295dd2880b9e8756a020a99e960d6852d72163f80335eaf99e9e18a50dafcbcfcadc7363a7ce93ff4ffd786362286f00f4ec4f14350e1a6f86ec77234829c5664c8b12f3718a5d4fc3469b2826eefebfe99fa800aa12f73ab111cd1027fbd74500f06bae2ae52697b2f68dee7092f4be623c271713a51a9f67ac15ed56f493f3b3bf0788194b455fdf7097816bb10166b52ddd86f2001d1eae81c6757ac03e30f0bbb16ee6f09f9c212175ad7b0eb4bb1c82b90c1502e6c055f31839415a3915d4ed9565b847586beaaa56b65f26e3e1360a6fbd839164b3f2b5b72580cb88d9d6bfb4cb13b87cd82a527a10b7f2b89ff13ca8c0a7149a61a43176b6be1145d793573cad50ca068578ac2734b01d639f3f404d7123e5749ed0d7bc07b6d9f479e019d061291e13064ca5cefe48d0f4f754545bed027cdbebe2c50d4401ddbc3482097d1b9a4c4ac72e38230e23e18ed4a1dd9db511ee23ffe00764a5d27a879c629ef98319ac4a32aa9741cec4192d42ff9daf5dd736e04d0e6e0af582c38d1e64ed9388caf5be88983b4ae2564195bdb387fefb2ed30dc47ec15085c6d7d8ca12cdfab706479fcadefc5411fa8e98f9a117b89a33829a9f32a553dcca129f8be49d26721e0a71653a03779b1c200e4debe992a10814073f38c331edf96d2781ab4fba3123d7b3cdc2f43cc2055459cf2b5a37076d19418e7f5c5a605f2f01c5d6bb22c226888e8d169f9d4cdb456edd6dd731951673b537ad569e0482621b8ac537975633ffda9d7de76584d7763d1b46150076f2089563ead02c372e2d3f15dab8194bcf5e8fffddfc0e3d46b3b7c98f61df32cf153d699fd4c79c6a2a39b8327465a9539945c32089a6fab23bcc5fbdc696fdb904a6e9d0c23c4f7d8fe8f81f7201572b6a362f4b87d26d1df1c3820bb401c996e46544740f5e920b1ba7e249c67a6f868c23d10a19ea7674c597c269bacea4c9fd8250dcac0d7c0dd2d498ea0dc5e380591a4d96bf93c46fbed002c80bb4391739a9d81250f1ce8faf13c20cf372aced4d74e6afcf459d9ffbd3dcaf89d5ad3141f5614f886ab68343854a8bddc91ef80cb663aff40ad56f13ea1e4790c838c40d48e4812fd8dea7155b42cb023deadc6ede9fe2030dfe2a6543529434f41ae897b3cc53340ce550604f13dafae1142f6fe0bfb565e0e32ae6cd31528279c1606ac0343054b2cc4f8b8b4b20cb0e30fdd59bb616c70877b9cdc978f97fe5898fc737159adc915dd3a7b4ad788e28bf1bcd0bf28e9ec1842072873d4c7a6003d4065618f558cbd34ada25458b88d09c16e1ab947c981d82749af049c0e77b8c5ea98b03d86fbebcf0fb61f961633ee851142f2ce81e7ad1953a14d436996a9d1a60a628bca0b41587fddd35ef5c947e2fd5c141145c334710256dc6490aeea080fa12f2a800550b7578c5e5aaa941dbf5d10cd45ea49a65451c3c27614377fca192ace80803d1d5e80e9fcebb6d03e742357383e8f8caf4feb562472c5ea445fee3ae176313f1076b51e6efa14f6618f29b6575c18ff7113aaa2f7b6e12024e2e71fd5f1c0fc53f132baca4ed7544a049eff8d7d4cea08d12bd69f823526125a3b20d480db4cb8adad5588eb090d618896964b4fd006169d310c2fbc279051ac8b030f5c2bad6efb25f8861f666c63062640633140396118601a3b5a76bbb9fb1544a4b68443488acad5323bd2591ce25a36cac8c7f6971f7bd5a1fbff760f8ecf7fd00ef246df8617e33334738f19607508ff1af8e0dd1074a7fe9e9f1252a63941a355172ef3f63b807b78dc47a742ca3cb1d0b9276c9d10c3a2fa0794e0ad87722e8806b20a7371ab526342726f755bbe042a79cc74094b81067da70a61b20ec0e85d4d9c759a412786f3a9e0a919272ca5ee6a8b190023e2e967976fd", 0x1000, 0x7}, {&(0x7f0000001540)="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", 0xfe, 0x8}, {&(0x7f0000000100)="c824d940ba52f369", 0x8}, {&(0x7f0000001640)="8b9791e655fed033d28d08ccddb025fccd43f2cc0561389cef3f2015bc72d0a1acfd05b52b939fa63a214199b6033c221d47d70dc83c2abd9d5916b2f747e01b205cf99e92aef8f2bba586088cf520e2b12c83237e502810711693fa6d052854e3a2070a7016e1da3f6b82961715defc96c2ae04d6dc78bb3889fb11b507ea87af4ddba82d4cb302802cf6edad4675a05b", 0x91, 0x6}], 0x40000, &(0x7f0000001800)={[{@lfs_mode='mode=lfs', 0x2c}, {@acl='acl', 0x2c}, {@heap='heap', 0x2c}, {@fastboot='fastboot', 0x2c}, {@noinline_dentry='noinline_dentry', 0x2c}, {@resgid={'resgid', 0x3d, [0x35, 0x30, 0x36, 0x2d, 0x0, 0x7d, 0x31, 0x33, 0x3d]}, 0x2c}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/zero\x00', 0x200000, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000002bc0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000002c80)={&(0x7f0000002b80)={0x10}, 0xc, &(0x7f0000002c40)={&(0x7f0000002c00)={0x34, r1, 0x32, 0x70bd26, 0x25dfdbfd, {0x1}, [@FOU_ATTR_AF={0x8, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000010) syz_mount_image$gfs2(&(0x7f0000002980)='gfs2\x00', &(0x7f00000029c0)='./file1\x00', 0x9366, 0x2, &(0x7f0000002ac0)=[{&(0x7f0000002a00)="ad176f88e487562466bd4b8bc298bee42ce9a09bfc0035b7b70666745e396d98414668b9f23ce7fee2cd21b85ce966174d65c54ec99cb442e3f64d85ab7a3f3c0dc6638bb64be8cb951719a2083f46e82fa0ee535adb677dd013820918b89db5147ec773bfed", 0x66, 0x3}, {&(0x7f0000002a80)="7a1c148503eaf05228294d2967ae1b5936494a1691d26aa8e0", 0x19, 0x100000000}], 0xa0000, &(0x7f0000002b00)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = creat(&(0x7f0000001840)='./file0\x00', 0x88) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000001880)={0x0}, &(0x7f00000018c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000001900)={r3, 0x1000, "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"}, &(0x7f0000002940)=0x1008) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000ffffffc300"}) [ 924.989153] kernel msg: ebtables bug: please report to author: Wrong len argument [ 924.997708] device lo entered promiscuous mode [ 925.007541] device lo left promiscuous mode [ 925.025085] device lo left promiscuous mode 2033/05/18 03:47:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000100"}, 0x2c) 2033/05/18 03:47:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000100"}, 0x2c) 2033/05/18 03:47:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty=0x7f00000000000000}}) [ 925.041099] device lo entered promiscuous mode [ 925.042286] autofs4:pid:20042:autofs4_fill_super: called with bogus options [ 925.051076] kernel msg: ebtables bug: please report to author: Wrong len argument [ 925.083136] device lo left promiscuous mode 2033/05/18 03:47:11 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000001f00"}) [ 925.109556] device lo entered promiscuous mode [ 925.128537] device lo left promiscuous mode 2033/05/18 03:47:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000007fffffff00"}) 2033/05/18 03:47:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty=0xfdfdffff00000000}}) 2033/05/18 03:47:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000048f00"}, 0x2c) [ 925.192914] autofs4:pid:20064:autofs4_fill_super: called with bogus options [ 925.222626] kernel msg: ebtables bug: please report to author: Wrong len argument [ 925.231503] device lo entered promiscuous mode 2033/05/18 03:47:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000600"}, 0x2c) [ 925.279450] kernel msg: ebtables bug: please report to author: Wrong len argument [ 925.294460] device lo left promiscuous mode [ 925.326935] device lo entered promiscuous mode [ 925.362680] device lo entered promiscuous mode [ 925.383897] device lo left promiscuous mode [ 925.399444] device lo left promiscuous mode [ 925.420701] device lo entered promiscuous mode [ 925.447852] device lo left promiscuous mode 2033/05/18 03:47:11 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='vfat\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000048f00"}, 0x2c) 2033/05/18 03:47:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty=0xfdfdffff}}) 2033/05/18 03:47:11 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000ffffffc300"}) 2033/05/18 03:47:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000000000001100"}) 2033/05/18 03:47:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000048f00"}, 0x2c) 2033/05/18 03:47:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 925.562781] kernel msg: ebtables bug: please report to author: Wrong len argument [ 925.562815] device lo entered promiscuous mode [ 925.598860] device lo entered promiscuous mode [ 925.607935] device lo left promiscuous mode 2033/05/18 03:47:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty=0x1000000}}) 2033/05/18 03:47:11 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) recvmsg$kcm(r1, &(0x7f0000000440)={&(0x7f00000000c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/141, 0x8d}, {&(0x7f0000000280)=""/132, 0x84}], 0x2, &(0x7f0000000380)=""/183, 0xb7, 0x4}, 0x40000000) 2033/05/18 03:47:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000048f00"}, 0x2c) [ 925.617668] kernel msg: ebtables bug: please report to author: Wrong len argument [ 925.625831] device lo left promiscuous mode [ 925.647927] device lo entered promiscuous mode 2033/05/18 03:47:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000008f0400"}, 0x2c) 2033/05/18 03:47:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00`\x00'}) 2033/05/18 03:47:11 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 925.676850] autofs4:pid:20138:autofs4_fill_super: called with bogus options [ 925.684742] device lo entered promiscuous mode [ 925.698494] device lo left promiscuous mode [ 925.713817] autofs4:pid:20142:autofs4_fill_super: called with bogus options 2033/05/18 03:47:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000100"}, 0x2c) 2033/05/18 03:47:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty=0x7f000000}}) [ 925.799586] device lo left promiscuous mode [ 925.836125] kernel msg: ebtables bug: please report to author: Wrong len argument [ 925.868177] device lo entered promiscuous mode [ 925.892844] device lo left promiscuous mode [ 925.893409] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000000f00"}) 2033/05/18 03:47:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000600"}, 0x2c) 2033/05/18 03:47:12 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0xc0, 0x250, 0x250, 0xffffffff, 0xffffffff, 0x368, 0x368, 0x368, 0xffffffff, 0x4, &(0x7f0000000100), {[{{@ip={@remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}, 0xffffffff, 0xffffffff, 'rose0\x00', 'ip6tnl0\x00', {0xff}, {0xff}, 0xef, 0x1, 0x40}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ip={@empty, @dev={0xac, 0x14, 0x14, 0x1a}, 0xffffff00, 0xff, 'lo\x00', '\x00', {0x4859b90f721f626}, {0xff}, 0x62, 0x2, 0x21}, 0x0, 0x130, 0x190, 0x0, {}, [@common=@unspec=@physdev={0x98, 'physdev\x00', 0x0, {'ip6_vti0\x00', {}, 'gre0\x00', {}, 0x1, 0x1c}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1e}, 0x10000, 0xa, [0x24, 0x2f, 0x3, 0x10, 0x6, 0x39, 0x0, 0x26, 0x3e, 0x15, 0x1, 0x1e, 0x36, 0x39, 0xb, 0xd], 0x3, 0x97, 0x7623}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xc, 0x1, 0x9}}, @common=@inet=@ipcomp={0x30, 'ipcomp\x00', 0x0, {0x4d4, 0x4d5, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x460) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000640)='/dev/snd/seq\x00', 0x0, 0x38000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) chmod(&(0x7f0000000080)='./file0\x00', 0x10) 2033/05/18 03:47:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000600"}, 0x2c) 2033/05/18 03:47:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00@\x00'}) 2033/05/18 03:47:12 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x7f000000]}}) [ 925.999763] device lo entered promiscuous mode [ 926.024184] autofs4:pid:20178:autofs4_fill_super: called with bogus options [ 926.028975] kernel msg: ebtables bug: please report to author: Wrong len argument [ 926.044059] device lo entered promiscuous mode [ 926.051784] autofs4:pid:20178:autofs4_fill_super: called with bogus options [ 926.060498] device lo left promiscuous mode 2033/05/18 03:47:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000600"}, 0x2c) [ 926.067679] kernel msg: ebtables bug: please report to author: Wrong len argument [ 926.076366] device lo left promiscuous mode [ 926.088511] device lo entered promiscuous mode 2033/05/18 03:47:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000100"}, 0x2c) [ 926.115251] device lo entered promiscuous mode 2033/05/18 03:47:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0xfdfdffff]}}) 2033/05/18 03:47:12 executing program 6: setrlimit(0x13, &(0x7f00000000c0)={0x101, 0x81}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000240)=0x6) utime(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x80, 0x80000001}) fanotify_init(0x2, 0x0) 2033/05/18 03:47:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000400"}) [ 926.137610] device lo left promiscuous mode [ 926.233854] device lo left promiscuous mode [ 926.252953] autofs4:pid:20212:autofs4_fill_super: called with bogus options [ 926.265335] device lo entered promiscuous mode 2033/05/18 03:47:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:12 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000001100"}) 2033/05/18 03:47:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000000048f"}, 0x2c) 2033/05/18 03:47:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000001600"}) 2033/05/18 03:47:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000048f00"}, 0x2c) 2033/05/18 03:47:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x7f00]}}) 2033/05/18 03:47:12 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(r0, &(0x7f00000001c0)=""/4096, 0x1000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) [ 926.289902] device lo left promiscuous mode [ 926.290702] QAT: Invalid ioctl [ 926.309460] autofs4:pid:20218:autofs4_fill_super: called with bogus options [ 926.325878] QAT: Invalid ioctl [ 926.379895] device lo entered promiscuous mode [ 926.399389] kernel msg: ebtables bug: please report to author: Wrong len argument [ 926.422727] kernel msg: ebtables bug: please report to author: Wrong len argument [ 926.425778] autofs4:pid:20236:autofs4_fill_super: called with bogus options [ 926.438141] device lo left promiscuous mode [ 926.458445] device lo entered promiscuous mode [ 926.469514] device lo entered promiscuous mode [ 926.482475] device lo left promiscuous mode [ 926.499137] device lo left promiscuous mode [ 926.529132] device lo entered promiscuous mode [ 926.548679] device lo left promiscuous mode 2033/05/18 03:47:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0xfffffdfd]}}) 2033/05/18 03:47:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000600"}, 0x2c) 2033/05/18 03:47:12 executing program 6: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x2000000000, 0x0, 0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x10000}, r0, 0x0, r1, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000100)=0xb247) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000440)='tls\x00', 0x4) 2033/05/18 03:47:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000600"}, 0x2c) 2033/05/18 03:47:12 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000001800"}) 2033/05/18 03:47:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000f00"}) 2033/05/18 03:47:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x5, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000001"}, 0x2c) [ 926.690278] kernel msg: ebtables bug: please report to author: Wrong len argument [ 926.698268] device lo entered promiscuous mode [ 926.702290] autofs4:pid:20263:autofs4_fill_super: called with bogus options 2033/05/18 03:47:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0xfdfdffff00000000]}}) [ 926.746932] device lo entered promiscuous mode [ 926.752948] autofs4:pid:20263:autofs4_fill_super: called with bogus options [ 926.759344] kernel msg: ebtables bug: please report to author: Wrong len argument [ 926.768942] device lo left promiscuous mode [ 926.781718] device lo entered promiscuous mode 2033/05/18 03:47:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000048f00"}, 0x2c) 2033/05/18 03:47:12 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0)={0xf2c7, 0x34d80, 0x7f, 0xffff, 0x3}, 0x14) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000001c0)={{0x3, 0x3, 0x6, 0x3, 0x7}, 0x1000, 0x3, 'id0\x00', 'timer0\x00', 0x0, 0x4, 0x8, 0x6, 0x53c9}) 2033/05/18 03:47:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000006"}, 0x2c) [ 926.793806] device lo left promiscuous mode [ 926.809745] device lo left promiscuous mode [ 926.836250] device lo entered promiscuous mode 2033/05/18 03:47:12 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 926.870578] device lo left promiscuous mode 2033/05/18 03:47:13 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00`\x00'}) 2033/05/18 03:47:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000048f00"}, 0x2c) 2033/05/18 03:47:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x100000000000000]}}) 2033/05/18 03:47:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000600"}, 0x2c) 2033/05/18 03:47:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) 2033/05/18 03:47:13 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x37, 0x3e3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x3e5, 0x0, 0x10000000000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) rename(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='./file0\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) [ 926.987815] kernel msg: ebtables bug: please report to author: Wrong len argument [ 927.026722] kernel msg: ebtables bug: please report to author: Wrong len argument [ 927.034745] device lo entered promiscuous mode [ 927.066180] device lo left promiscuous mode 2033/05/18 03:47:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000008f0400"}, 0x2c) 2033/05/18 03:47:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x7f00000000000000]}}) 2033/05/18 03:47:13 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000008f0400"}, 0x2c) [ 927.099413] device lo entered promiscuous mode [ 927.104395] autofs4:pid:20319:autofs4_fill_super: called with bogus options [ 927.119936] device lo entered promiscuous mode [ 927.137237] autofs4:pid:20319:autofs4_fill_super: called with bogus options [ 927.156279] device lo left promiscuous mode [ 927.170315] device lo left promiscuous mode [ 927.204940] kernel msg: ebtables bug: please report to author: Wrong len argument [ 927.230539] device lo entered promiscuous mode [ 927.251842] kernel msg: ebtables bug: please report to author: Wrong len argument [ 927.261443] device lo left promiscuous mode 2033/05/18 03:47:13 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000048f00"}, 0x2c) 2033/05/18 03:47:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000000000000200"}) 2033/05/18 03:47:13 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x37, 0x3e3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x3e5, 0x0, 0x10000000000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) rename(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='./file0\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 2033/05/18 03:47:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000004"}, 0x2c) 2033/05/18 03:47:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x1000000]}}) 2033/05/18 03:47:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000000200"}) 2033/05/18 03:47:13 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 927.368437] device lo entered promiscuous mode [ 927.368991] kernel msg: ebtables bug: please report to author: Wrong len argument [ 927.379834] autofs4:pid:20357:autofs4_fill_super: called with bogus options 2033/05/18 03:47:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000048f00"}, 0x2c) [ 927.409996] device lo left promiscuous mode [ 927.428150] kernel msg: ebtables bug: please report to author: Wrong len argument [ 927.437174] device lo entered promiscuous mode [ 927.445694] device lo entered promiscuous mode [ 927.466881] device lo left promiscuous mode [ 927.492568] device lo left promiscuous mode [ 927.509478] device lo entered promiscuous mode [ 927.533972] device lo left promiscuous mode 2033/05/18 03:47:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x7f00000000000000]}}) 2033/05/18 03:47:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000100"}, 0x2c) 2033/05/18 03:47:13 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(r0, &(0x7f00000001c0)=""/4096, 0x1000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000000000000600"}) 2033/05/18 03:47:13 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000100"}, 0x2c) 2033/05/18 03:47:13 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000000400"}) [ 927.619887] kernel msg: ebtables bug: please report to author: Wrong len argument [ 927.620375] device lo entered promiscuous mode [ 927.646795] autofs4:pid:20388:autofs4_fill_super: called with bogus options [ 927.648936] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:13 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x80247009, &(0x7f0000000040)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) 2033/05/18 03:47:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000600"}, 0x2c) [ 927.666887] device lo entered promiscuous mode [ 927.681312] device lo left promiscuous mode [ 927.697224] device lo left promiscuous mode [ 927.714497] device lo entered promiscuous mode 2033/05/18 03:47:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000600"}, 0x2c) 2033/05/18 03:47:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0xfdfdffff00000000]}}) [ 927.744253] device lo left promiscuous mode 2033/05/18 03:47:13 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 927.770561] autofs4:pid:20402:autofs4_fill_super: called with bogus options [ 927.791641] device lo entered promiscuous mode [ 927.814715] device lo left promiscuous mode 2033/05/18 03:47:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}) 2033/05/18 03:47:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000048f00"}, 0x2c) 2033/05/18 03:47:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x100000000000000]}}) [ 927.833705] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:13 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000600"}, 0x2c) 2033/05/18 03:47:14 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x80247009, &(0x7f0000000040)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) 2033/05/18 03:47:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\a\x00'}) [ 927.891923] kernel msg: ebtables bug: please report to author: Wrong len argument [ 927.923847] device lo entered promiscuous mode [ 927.965159] device lo left promiscuous mode [ 928.005125] device lo entered promiscuous mode [ 928.018973] autofs4:pid:20436:autofs4_fill_super: called with bogus options [ 928.039135] device lo left promiscuous mode [ 928.050750] device lo entered promiscuous mode [ 928.086488] device lo left promiscuous mode 2033/05/18 03:47:14 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 928.113919] device lo entered promiscuous mode [ 928.122838] device lo left promiscuous mode 2033/05/18 03:47:14 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x80247009, &(0x7f0000000040)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) 2033/05/18 03:47:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x1000000]}}) 2033/05/18 03:47:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000600"}, 0x2c) 2033/05/18 03:47:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000001800"}) 2033/05/18 03:47:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000100"}, 0x2c) 2033/05/18 03:47:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000300"}) 2033/05/18 03:47:14 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000600"}, 0x2c) [ 928.203294] kernel msg: ebtables bug: please report to author: Wrong len argument [ 928.204310] device lo entered promiscuous mode [ 928.218261] autofs4:pid:20460:autofs4_fill_super: called with bogus options [ 928.235869] kernel msg: ebtables bug: please report to author: Wrong len argument [ 928.250626] device lo entered promiscuous mode [ 928.277171] device lo left promiscuous mode 2033/05/18 03:47:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000008f0400"}, 0x2c) 2033/05/18 03:47:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x7f000000]}}) [ 928.298370] device lo left promiscuous mode [ 928.315659] device lo entered promiscuous mode [ 928.334207] device lo left promiscuous mode 2033/05/18 03:47:14 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 928.346193] device lo entered promiscuous mode [ 928.368910] kernel msg: ebtables bug: please report to author: Wrong len argument [ 928.387265] device lo left promiscuous mode [ 928.403974] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000600"}, 0x2c) 2033/05/18 03:47:14 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, &(0x7f0000000040)) 2033/05/18 03:47:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000200"}) 2033/05/18 03:47:14 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:14 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0xfdfdffff]}}) 2033/05/18 03:47:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000000000001f00"}) 2033/05/18 03:47:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 928.535432] autofs4:pid:20506:autofs4_fill_super: called with bogus options [ 928.538114] kernel msg: ebtables bug: please report to author: Wrong len argument [ 928.553603] device lo entered promiscuous mode [ 928.564351] kernel msg: ebtables bug: please report to author: Wrong len argument [ 928.573923] device lo left promiscuous mode 2033/05/18 03:47:14 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:14 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x80247009, &(0x7f0000000040)) [ 928.586526] device lo entered promiscuous mode [ 928.595323] device lo entered promiscuous mode [ 928.614596] device lo left promiscuous mode 2033/05/18 03:47:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000048f00"}, 0x2c) 2033/05/18 03:47:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000400"}) [ 928.652456] kernel msg: ebtables bug: please report to author: Wrong len argument [ 928.665385] device lo entered promiscuous mode 2033/05/18 03:47:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x7f00]}}) 2033/05/18 03:47:14 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d", 0x103}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 928.705476] device lo left promiscuous mode [ 928.722811] autofs4:pid:20526:autofs4_fill_super: called with bogus options [ 928.733296] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000008f0400"}, 0x2c) 2033/05/18 03:47:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000600"}, 0x2c) 2033/05/18 03:47:14 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000000fffffdfd00"}) [ 928.821104] device lo left promiscuous mode [ 928.844064] device lo entered promiscuous mode [ 928.862473] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0xfffffdfd]}}) 2033/05/18 03:47:14 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, &(0x7f0000000040)) 2033/05/18 03:47:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000600"}, 0x2c) [ 928.890165] device lo entered promiscuous mode [ 928.898831] kernel msg: ebtables bug: please report to author: Wrong len argument [ 928.913312] device lo left promiscuous mode [ 928.922848] device lo left promiscuous mode [ 928.968892] device lo entered promiscuous mode [ 929.007130] device lo left promiscuous mode 2033/05/18 03:47:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000fffffdfd00"}) 2033/05/18 03:47:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000006"}, 0x2c) 2033/05/18 03:47:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x7f00000000000000]}}) 2033/05/18 03:47:15 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:15 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:15 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, &(0x7f0000000040)) 2033/05/18 03:47:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\a\x00'}) [ 929.134316] kernel msg: ebtables bug: please report to author: Wrong len argument [ 929.152592] kernel msg: ebtables bug: please report to author: Wrong len argument [ 929.160480] device lo entered promiscuous mode [ 929.167897] device lo entered promiscuous mode [ 929.176381] device lo left promiscuous mode 2033/05/18 03:47:15 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, &(0x7f0000000040)) 2033/05/18 03:47:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0xfdfdffff00000000]}}) 2033/05/18 03:47:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000000048f"}, 0x2c) 2033/05/18 03:47:15 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 929.199520] device lo left promiscuous mode [ 929.212997] device lo entered promiscuous mode [ 929.233323] device lo entered promiscuous mode [ 929.243750] device lo left promiscuous mode [ 929.271423] kernel msg: ebtables bug: please report to author: Wrong len argument [ 929.327313] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000100"}) 2033/05/18 03:47:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000fdfdffff00"}) 2033/05/18 03:47:15 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, &(0x7f0000000040)) 2033/05/18 03:47:15 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0xfdfdffff]}}) 2033/05/18 03:47:15 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000001"}, 0x2c) [ 929.442394] device lo left promiscuous mode [ 929.452844] kernel msg: ebtables bug: please report to author: Wrong len argument [ 929.476556] kernel msg: ebtables bug: please report to author: Wrong len argument [ 929.482841] device lo entered promiscuous mode 2033/05/18 03:47:15 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, &(0x7f0000000040)) [ 929.491561] device lo entered promiscuous mode 2033/05/18 03:47:15 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x1000000]}}) [ 929.513167] device lo left promiscuous mode [ 929.520484] device lo left promiscuous mode [ 929.552347] device lo entered promiscuous mode 2033/05/18 03:47:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000048f00"}, 0x2c) [ 929.568106] kernel msg: ebtables bug: please report to author: Wrong len argument [ 929.592729] device lo left promiscuous mode 2033/05/18 03:47:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000feffffff00"}) 2033/05/18 03:47:15 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:15 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, &(0x7f0000000040)) [ 929.633254] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000001800"}) 2033/05/18 03:47:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000000100"}, 0x2c) [ 929.736208] device lo entered promiscuous mode [ 929.758844] device lo left promiscuous mode [ 929.801845] device lo entered promiscuous mode 2033/05/18 03:47:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x7f000000]}}) 2033/05/18 03:47:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:15 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, &(0x7f0000000040)) 2033/05/18 03:47:15 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000000600"}, 0x2c) 2033/05/18 03:47:15 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}) 2033/05/18 03:47:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000000000001600"}) [ 929.832360] device lo entered promiscuous mode [ 929.839816] device lo left promiscuous mode [ 929.848666] device lo left promiscuous mode [ 929.869250] device lo entered promiscuous mode 2033/05/18 03:47:16 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, &(0x7f0000000040)) 2033/05/18 03:47:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000048f00"}, 0x2c) [ 929.935614] kernel msg: ebtables bug: please report to author: Wrong len argument [ 929.942617] device lo entered promiscuous mode [ 929.957738] kernel msg: ebtables bug: please report to author: Wrong len argument [ 929.960718] device lo left promiscuous mode [ 929.989886] device lo left promiscuous mode 2033/05/18 03:47:16 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 930.016552] device lo entered promiscuous mode [ 930.054399] device lo left promiscuous mode [ 930.080865] device lo entered promiscuous mode [ 930.093997] kernel msg: ebtables bug: please report to author: Wrong len argument [ 930.101946] device lo left promiscuous mode [ 930.118192] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:16 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, &(0x7f0000000040)) 2033/05/18 03:47:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x7f00]}}) 2033/05/18 03:47:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}) 2033/05/18 03:47:16 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000007fffffff00"}) 2033/05/18 03:47:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000008f0400"}, 0x2c) 2033/05/18 03:47:16 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 930.220291] device lo entered promiscuous mode 2033/05/18 03:47:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0xfffffdfd]}}) 2033/05/18 03:47:16 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, &(0x7f0000000040)) [ 930.243523] kernel msg: ebtables bug: please report to author: Wrong len argument [ 930.246186] device lo entered promiscuous mode [ 930.268353] kernel msg: ebtables bug: please report to author: Wrong len argument [ 930.282948] device lo left promiscuous mode 2033/05/18 03:47:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000600"}, 0x2c) [ 930.291134] device lo entered promiscuous mode 2033/05/18 03:47:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000100"}, 0x2c) 2033/05/18 03:47:16 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, &(0x7f0000000040)) [ 930.339961] device lo left promiscuous mode [ 930.381065] device lo left promiscuous mode 2033/05/18 03:47:16 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 2033/05/18 03:47:16 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 930.401346] device lo entered promiscuous mode [ 930.456188] device lo left promiscuous mode 2033/05/18 03:47:16 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x80247009, &(0x7f0000000040)) 2033/05/18 03:47:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000048f00"}, 0x2c) 2033/05/18 03:47:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x100000000000000]}}) 2033/05/18 03:47:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000600"}, 0x2c) [ 930.485387] kernel msg: ebtables bug: please report to author: Wrong len argument [ 930.496114] device lo entered promiscuous mode [ 930.514642] kernel msg: ebtables bug: please report to author: Wrong len argument [ 930.557891] device lo left promiscuous mode 2033/05/18 03:47:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00?\x00'}) 2033/05/18 03:47:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000600"}, 0x2c) 2033/05/18 03:47:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x1000000]}}) 2033/05/18 03:47:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000600"}, 0x2c) [ 930.612429] device lo entered promiscuous mode [ 930.669865] device lo left promiscuous mode [ 930.707477] device lo entered promiscuous mode [ 930.734653] device lo left promiscuous mode [ 930.765663] device lo entered promiscuous mode 2033/05/18 03:47:16 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 930.791851] device lo left promiscuous mode 2033/05/18 03:47:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x7f000000]}}) 2033/05/18 03:47:16 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000300"}) 2033/05/18 03:47:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000008f0400"}, 0x2c) 2033/05/18 03:47:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00?\x00'}) [ 930.849298] device lo entered promiscuous mode [ 930.858093] kernel msg: ebtables bug: please report to author: Wrong len argument [ 930.875478] kernel msg: ebtables bug: please report to author: Wrong len argument [ 930.875988] device lo entered promiscuous mode 2033/05/18 03:47:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000004"}, 0x2c) [ 930.908971] device lo left promiscuous mode [ 930.921261] device lo left promiscuous mode [ 930.936109] device lo entered promiscuous mode [ 930.954116] device lo left promiscuous mode 2033/05/18 03:47:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:17 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 930.987944] device lo entered promiscuous mode [ 930.995697] device lo left promiscuous mode 2033/05/18 03:47:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000000000000300"}) 2033/05/18 03:47:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0xfdfdffff]}}) 2033/05/18 03:47:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000c0ffffff00"}) 2033/05/18 03:47:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000048f00"}, 0x2c) [ 931.067779] kernel msg: ebtables bug: please report to author: Wrong len argument [ 931.077877] device lo entered promiscuous mode [ 931.092157] device lo entered promiscuous mode [ 931.093320] kernel msg: ebtables bug: please report to author: Wrong len argument [ 931.104664] device lo left promiscuous mode 2033/05/18 03:47:17 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000600"}, 0x2c) 2033/05/18 03:47:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000048f00"}, 0x2c) [ 931.119137] device lo left promiscuous mode [ 931.128522] device lo entered promiscuous mode [ 931.158500] device lo entered promiscuous mode 2033/05/18 03:47:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x7f00]}}) [ 931.176439] device lo left promiscuous mode [ 931.187110] device lo left promiscuous mode [ 931.199122] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000007fffffff00"}) 2033/05/18 03:47:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000400"}) 2033/05/18 03:47:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000600"}, 0x2c) 2033/05/18 03:47:17 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 931.231236] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000600"}, 0x2c) 2033/05/18 03:47:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0xfffffdfd]}}) [ 931.316216] device lo entered promiscuous mode [ 931.327709] kernel msg: ebtables bug: please report to author: Wrong len argument [ 931.338553] device lo entered promiscuous mode [ 931.352062] device lo left promiscuous mode 2033/05/18 03:47:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000008f0400"}, 0x2c) 2033/05/18 03:47:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000048f00"}, 0x2c) [ 931.363659] device lo left promiscuous mode [ 931.380306] device lo entered promiscuous mode [ 931.383452] kernel msg: ebtables bug: please report to author: Wrong len argument [ 931.393779] device lo left promiscuous mode [ 931.403705] device lo entered promiscuous mode 2033/05/18 03:47:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) [ 931.420548] device lo left promiscuous mode 2033/05/18 03:47:17 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000008f0400"}, 0x2c) 2033/05/18 03:47:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000500"}) 2033/05/18 03:47:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x100000000000000]}}) 2033/05/18 03:47:17 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") 2033/05/18 03:47:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000000000000400"}) 2033/05/18 03:47:17 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f00000001c0)="9bc1340f052838522d44270c2eab5dab72186f68eae7727b18aeb4daff47718d3d1cd9ac5fafced02b4aa0dc43cf3d35f489ec27c05d565223804211", 0x3c}, {&(0x7f0000000200)="3446ddb0c09bb32787aa6b20d2e45aa347e1d0aa5fbf08df577865493cbfad5647eb", 0x22}, {&(0x7f0000000240)="ff9a1898f69adf6e76f06d2403726b028d0e7a64bbb6636ab7625c77dc60c6162f651541e1b9a7a1dd8d940a108288883f61ed210f1b9a0193cd3674bf024a73cf7ae06cdf", 0x45}, {&(0x7f00000002c0)="e8404fd578c6e121c2a6e4836ba93be738918ce803698e3b27eea7", 0x1b}], 0x4, &(0x7f0000000500)=[@rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}], 0x38, 0x4000000}, 0x4000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) [ 931.521419] device lo entered promiscuous mode [ 931.539125] device lo left promiscuous mode [ 931.545551] device lo entered promiscuous mode [ 931.551341] device lo left promiscuous mode [ 931.591744] kernel msg: ebtables bug: please report to author: Wrong len argument [ 931.608669] device lo entered promiscuous mode [ 931.621368] autofs4:pid:20913:autofs4_fill_super: called with bogus options [ 931.635137] device lo entered promiscuous mode 2033/05/18 03:47:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x7f00000000000000]}}) [ 931.650515] kernel msg: ebtables bug: please report to author: Wrong len argument [ 931.658371] device lo left promiscuous mode [ 931.676591] device lo left promiscuous mode 2033/05/18 03:47:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000048f00"}, 0x2c) 2033/05/18 03:47:17 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") [ 931.699241] device lo entered promiscuous mode 2033/05/18 03:47:17 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x3, 0x7, 0x5) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21}, {0x306, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x40, {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 'bond_slave_0\x00'}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=""/180, 0xb4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) [ 931.739180] device lo entered promiscuous mode [ 931.751923] device lo left promiscuous mode [ 931.772224] device lo left promiscuous mode 2033/05/18 03:47:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000fffffdfd00"}) 2033/05/18 03:47:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000100"}, 0x2c) [ 931.822398] kernel msg: ebtables bug: please report to author: Wrong len argument [ 931.852316] autofs4:pid:20948:autofs4_fill_super: called with bogus options [ 931.883844] kernel msg: ebtables bug: please report to author: Wrong len argument [ 931.897656] device lo entered promiscuous mode [ 931.931556] device lo left promiscuous mode 2033/05/18 03:47:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000048f00"}, 0x2c) 2033/05/18 03:47:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000f00"}) 2033/05/18 03:47:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0xfdfdffff00000000]}}) 2033/05/18 03:47:18 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") 2033/05/18 03:47:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000048f00"}, 0x2c) 2033/05/18 03:47:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x3, 0x7, 0x5) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21}, {0x306, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x40, {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 'bond_slave_0\x00'}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=""/180, 0xb4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) 2033/05/18 03:47:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 931.963095] device lo entered promiscuous mode [ 931.978750] device lo left promiscuous mode 2033/05/18 03:47:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000300"}) 2033/05/18 03:47:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000600"}, 0x2c) [ 932.054417] device lo entered promiscuous mode [ 932.057296] kernel msg: ebtables bug: please report to author: Wrong len argument [ 932.083149] device lo left promiscuous mode 2033/05/18 03:47:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:18 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") 2033/05/18 03:47:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x7f000000]}}) [ 932.113780] kernel msg: ebtables bug: please report to author: Wrong len argument [ 932.117055] device lo entered promiscuous mode [ 932.131353] autofs4:pid:20981:autofs4_fill_super: called with bogus options [ 932.150359] device lo entered promiscuous mode [ 932.168179] device lo left promiscuous mode 2033/05/18 03:47:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 932.209567] device lo left promiscuous mode [ 932.235423] device lo entered promiscuous mode 2033/05/18 03:47:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x3, 0x7, 0x5) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21}, {0x306, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x40, {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 'bond_slave_0\x00'}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=""/180, 0xb4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x0, &(0x7f00000001c0)) [ 932.268396] kernel msg: ebtables bug: please report to author: Wrong len argument [ 932.278342] device lo left promiscuous mode [ 932.330681] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:18 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") 2033/05/18 03:47:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000fdfdffff00"}) 2033/05/18 03:47:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000600"}, 0x2c) 2033/05/18 03:47:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x7f00]}}) 2033/05/18 03:47:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000500"}) 2033/05/18 03:47:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000000048f"}, 0x2c) 2033/05/18 03:47:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:18 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = memfd_create(&(0x7f00000000c0)='dev ', 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(0xffffffffffffffff, r0, &(0x7f0000001000), 0xffff) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) sendfile(r0, r0, &(0x7f0000000000), 0x100000) tkill(r1, 0x1000000000016) [ 932.375853] autofs4:pid:21011:autofs4_fill_super: called with bogus options [ 932.454242] device lo entered promiscuous mode [ 932.468062] kernel msg: ebtables bug: please report to author: Wrong len argument [ 932.476542] device lo entered promiscuous mode [ 932.492572] device lo left promiscuous mode 2033/05/18 03:47:18 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") 2033/05/18 03:47:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000048f00"}, 0x2c) 2033/05/18 03:47:18 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 932.500064] kernel msg: ebtables bug: please report to author: Wrong len argument [ 932.511000] device lo entered promiscuous mode [ 932.552438] device lo left promiscuous mode 2033/05/18 03:47:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}}) 2033/05/18 03:47:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:18 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") [ 932.573079] device lo left promiscuous mode [ 932.584629] device lo entered promiscuous mode [ 932.593653] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000001600"}) [ 932.651403] device lo left promiscuous mode [ 932.656131] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 932.731254] device lo entered promiscuous mode [ 932.765216] device lo left promiscuous mode [ 932.810674] device lo entered promiscuous mode [ 932.839241] device lo left promiscuous mode 2033/05/18 03:47:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}) 2033/05/18 03:47:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}) 2033/05/18 03:47:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000600"}, 0x2c) 2033/05/18 03:47:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000000100"}, 0x2c) 2033/05/18 03:47:19 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\b\x00'}) 2033/05/18 03:47:19 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") [ 933.339405] device lo entered promiscuous mode [ 933.346519] kernel msg: ebtables bug: please report to author: Wrong len argument [ 933.357402] device lo entered promiscuous mode 2033/05/18 03:47:19 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") 2033/05/18 03:47:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000000600"}, 0x2c) 2033/05/18 03:47:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x7f00000000000000]}}) 2033/05/18 03:47:19 executing program 5 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 933.380312] device lo left promiscuous mode [ 933.380397] kernel msg: ebtables bug: please report to author: Wrong len argument [ 933.405012] device lo left promiscuous mode [ 933.421308] device lo entered promiscuous mode 2033/05/18 03:47:19 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 933.489538] device lo left promiscuous mode 2033/05/18 03:47:19 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") [ 933.514624] device lo entered promiscuous mode 2033/05/18 03:47:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000000ffffffc000"}) [ 933.548843] kernel msg: ebtables bug: please report to author: Wrong len argument [ 933.551760] FAULT_INJECTION: forcing a failure. [ 933.551760] name failslab, interval 1, probability 0, space 0, times 0 [ 933.567943] CPU: 1 PID: 21115 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #54 [ 933.575227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 933.584591] Call Trace: [ 933.587202] dump_stack+0x1b9/0x294 [ 933.590852] ? dump_stack_print_info.cold.2+0x52/0x52 2033/05/18 03:47:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000001"}, 0x2c) [ 933.596066] should_fail.cold.4+0xa/0x1a [ 933.600148] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 933.605268] ? __lock_acquire+0x7f5/0x5140 [ 933.609519] ? graph_lock+0x170/0x170 [ 933.613342] ? graph_lock+0x170/0x170 [ 933.617163] ? find_held_lock+0x36/0x1c0 [ 933.620309] kernel msg: ebtables bug: please report to author: Wrong len argument [ 933.621259] ? __lock_is_held+0xb5/0x140 [ 933.621288] ? check_same_owner+0x320/0x320 [ 933.637274] ? lock_downgrade+0x8e0/0x8e0 [ 933.641439] ? rcu_note_context_switch+0x710/0x710 [ 933.646385] ? lock_release+0xa10/0xa10 [ 933.650396] __should_failslab+0x124/0x180 [ 933.654644] should_failslab+0x9/0x14 [ 933.658456] __kmalloc_track_caller+0x2c4/0x760 [ 933.663137] ? __might_sleep+0x95/0x190 [ 933.667131] ? __tun_chr_ioctl+0x3778/0x4420 [ 933.671554] memdup_user+0x2c/0xa0 [ 933.675109] __tun_chr_ioctl+0x3778/0x4420 [ 933.679354] ? find_held_lock+0x36/0x1c0 [ 933.683438] ? tun_chr_read_iter+0x1e0/0x1e0 [ 933.687868] ? lock_downgrade+0x8e0/0x8e0 [ 933.692035] ? rcu_is_watching+0x85/0x140 [ 933.696192] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 933.701406] ? __fget+0x40c/0x650 [ 933.704876] ? match_held_lock+0x841/0x8b0 [ 933.709134] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 933.714086] tun_chr_ioctl+0x2a/0x40 [ 933.717815] ? tun_chr_compat_ioctl+0x30/0x30 [ 933.722322] do_vfs_ioctl+0x1cf/0x16a0 [ 933.726229] ? ioctl_preallocate+0x2e0/0x2e0 [ 933.730650] ? fget_raw+0x20/0x20 [ 933.734115] ? __sb_end_write+0xac/0xe0 [ 933.738110] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 933.743657] ? fput+0x130/0x1a0 [ 933.746952] ? ksys_write+0x1a6/0x250 [ 933.750769] ? security_file_ioctl+0x94/0xc0 [ 933.755192] ksys_ioctl+0xa9/0xd0 [ 933.758662] __x64_sys_ioctl+0x73/0xb0 [ 933.762569] do_syscall_64+0x1b1/0x800 [ 933.766459] ? finish_task_switch+0x1ca/0x840 [ 933.770945] ? syscall_return_slowpath+0x5c0/0x5c0 [ 933.775874] ? syscall_return_slowpath+0x30f/0x5c0 [ 933.780804] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 933.786160] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 933.790995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 933.796183] RIP: 0033:0x455a09 [ 933.799355] RSP: 002b:00007f65efae7c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 933.807061] RAX: ffffffffffffffda RBX: 00007f65efae86d4 RCX: 0000000000455a09 [ 933.814332] RDX: 0000000020000080 RSI: 00000000400454d1 RDI: 0000000000000014 [ 933.821597] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 933.828859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 933.836137] R13: 0000000000000379 R14: 00000000006f93f8 R15: 0000000000000000 [ 933.847606] device lo entered promiscuous mode [ 933.857314] device lo left promiscuous mode 2033/05/18 03:47:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}}) 2033/05/18 03:47:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000008f0400"}, 0x2c) 2033/05/18 03:47:20 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000000100"}) 2033/05/18 03:47:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000006"}, 0x2c) 2033/05/18 03:47:20 executing program 5 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000000000000500"}) 2033/05/18 03:47:20 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") [ 933.899863] device lo entered promiscuous mode [ 933.906550] device lo left promiscuous mode [ 933.953356] device lo left promiscuous mode [ 933.967347] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000000600"}, 0x2c) 2033/05/18 03:47:20 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") 2033/05/18 03:47:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}}) 2033/05/18 03:47:20 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 934.009198] device lo entered promiscuous mode [ 934.010974] kernel msg: ebtables bug: please report to author: Wrong len argument [ 934.026714] device lo left promiscuous mode [ 934.043500] device lo entered promiscuous mode [ 934.108813] device lo left promiscuous mode 2033/05/18 03:47:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 2033/05/18 03:47:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000008f0400"}, 0x2c) 2033/05/18 03:47:20 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x800, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") [ 934.137989] kernel msg: ebtables bug: please report to author: Wrong len argument [ 934.156956] device lo entered promiscuous mode 2033/05/18 03:47:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x1000000]}}) [ 934.179419] device lo left promiscuous mode [ 934.187873] kernel msg: ebtables bug: please report to author: Wrong len argument [ 934.214522] device lo entered promiscuous mode [ 934.279532] device lo left promiscuous mode [ 934.326468] device lo entered promiscuous mode [ 934.341485] device lo left promiscuous mode 2033/05/18 03:47:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000000ffffffff00"}) 2033/05/18 03:47:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:20 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:20 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)="444cfe4da4ee6eddc4bfb65a2e79abe291334aef81db9f9946d8c27d8c39ae03141e696af0994b53fb49c5471845267d4171c379ddef5be3691dad256231f90aebf7a54c58a809dee128c06544955f97a1b3e6538e8553931cc284f2d62e9f7a73c849a77b107970d43c6a0000000000000000") 2033/05/18 03:47:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}}) 2033/05/18 03:47:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000ffffffc000"}) 2033/05/18 03:47:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x2, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:20 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 934.448875] kernel msg: ebtables bug: please report to author: Wrong len argument [ 934.460974] device lo entered promiscuous mode [ 934.466956] kernel msg: ebtables bug: please report to author: Wrong len argument [ 934.475747] device lo entered promiscuous mode [ 934.490640] device lo left promiscuous mode 2033/05/18 03:47:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000600"}, 0x2c) 2033/05/18 03:47:20 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000100"}, 0x2c) [ 934.516148] device lo left promiscuous mode [ 934.531832] device lo entered promiscuous mode [ 934.552710] device lo left promiscuous mode 2033/05/18 03:47:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000]}}) 2033/05/18 03:47:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) [ 934.584496] kernel msg: ebtables bug: please report to author: Wrong len argument [ 934.595224] device lo entered promiscuous mode [ 934.596410] kernel msg: ebtables bug: please report to author: Wrong len argument [ 934.615985] device lo left promiscuous mode 2033/05/18 03:47:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0xc0189436, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 934.711006] device lo entered promiscuous mode [ 934.780578] device lo left promiscuous mode 2033/05/18 03:47:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000048f00"}, 0x2c) 2033/05/18 03:47:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000008f0400"}, 0x2c) 2033/05/18 03:47:20 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}}) 2033/05/18 03:47:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000001800"}) 2033/05/18 03:47:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454d4, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:20 executing program 6 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000ffffffc000"}) [ 934.800849] device lo entered promiscuous mode [ 934.810336] device lo left promiscuous mode [ 934.867524] kernel msg: ebtables bug: please report to author: Wrong len argument [ 934.874049] device lo entered promiscuous mode [ 934.889726] FAULT_INJECTION: forcing a failure. [ 934.889726] name failslab, interval 1, probability 0, space 0, times 0 [ 934.901142] CPU: 0 PID: 21274 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 934.908436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 934.909148] kernel msg: ebtables bug: please report to author: Wrong len argument [ 934.917798] Call Trace: [ 934.917830] dump_stack+0x1b9/0x294 [ 934.917858] ? dump_stack_print_info.cold.2+0x52/0x52 [ 934.917891] should_fail.cold.4+0xa/0x1a [ 934.917916] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 934.917940] ? lock_downgrade+0x8e0/0x8e0 [ 934.917962] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 934.955839] ? proc_fail_nth_write+0x96/0x1f0 [ 934.960367] ? find_held_lock+0x36/0x1c0 2033/05/18 03:47:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000004"}, 0x2c) 2033/05/18 03:47:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000ffffffffffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 934.964497] ? check_same_owner+0x320/0x320 [ 934.968853] ? rcu_note_context_switch+0x710/0x710 [ 934.973830] __should_failslab+0x124/0x180 [ 934.978103] should_failslab+0x9/0x14 [ 934.981929] __kmalloc_track_caller+0x2c4/0x760 [ 934.986599] kernel msg: ebtables bug: please report to author: Wrong len argument [ 934.986632] ? strncpy_from_user+0x500/0x500 [ 934.998653] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 935.003506] kernel msg: ebtables bug: please report to author: Wrong len argument [ 935.004204] ? strndup_user+0x77/0xd0 [ 935.004231] memdup_user+0x2c/0xa0 [ 935.004254] strndup_user+0x77/0xd0 [ 935.004277] ksys_mount+0x3c/0x140 [ 935.004303] __x64_sys_mount+0xbe/0x150 [ 935.004319] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 935.004340] do_syscall_64+0x1b1/0x800 [ 935.039324] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 935.044205] ? syscall_return_slowpath+0x5c0/0x5c0 [ 935.049170] ? syscall_return_slowpath+0x30f/0x5c0 [ 935.054141] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 935.059542] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 935.064425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.069632] RIP: 0033:0x455a09 [ 935.072816] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 935.080527] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 935.087898] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 935.095194] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 935.102466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 935.109727] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000000 [ 935.118372] device lo left promiscuous mode [ 935.128211] device lo entered promiscuous mode [ 935.151280] device lo entered promiscuous mode [ 935.172099] device lo left promiscuous mode [ 935.188537] device lo left promiscuous mode [ 935.222277] device lo entered promiscuous mode [ 935.231807] device lo left promiscuous mode 2033/05/18 03:47:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000600"}, 0x2c) 2033/05/18 03:47:21 executing program 6 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}) 2033/05/18 03:47:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000001100"}) 2033/05/18 03:47:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x8924, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\a\x00'}) [ 935.306379] device lo entered promiscuous mode [ 935.314709] kernel msg: ebtables bug: please report to author: Wrong len argument [ 935.319267] FAULT_INJECTION: forcing a failure. [ 935.319267] name failslab, interval 1, probability 0, space 0, times 0 [ 935.333771] CPU: 0 PID: 21313 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 935.336766] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000ffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 935.341058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.341066] Call Trace: [ 935.341094] dump_stack+0x1b9/0x294 [ 935.341127] ? dump_stack_print_info.cold.2+0x52/0x52 [ 935.369607] should_fail.cold.4+0xa/0x1a [ 935.373708] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 935.378851] ? save_stack+0x43/0xd0 [ 935.382514] ? memdup_user+0x2c/0xa0 [ 935.385785] kernel msg: ebtables bug: please report to author: Wrong len argument [ 935.386332] ? strndup_user+0x77/0xd0 [ 935.386354] ? graph_lock+0x170/0x170 2033/05/18 03:47:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 935.386374] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.386411] ? find_held_lock+0x36/0x1c0 [ 935.386443] ? flow_hash_from_keys+0x4c0/0xa80 [ 935.396363] kernel msg: ebtables bug: please report to author: Wrong len argument [ 935.397885] ? check_same_owner+0x320/0x320 [ 935.397906] ? lock_release+0xa10/0xa10 [ 935.397928] ? rcu_note_context_switch+0x710/0x710 [ 935.397947] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 935.397964] ? __check_object_size+0x95/0x5d9 [ 935.397985] __should_failslab+0x124/0x180 2033/05/18 03:47:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 935.440860] kernel msg: ebtables bug: please report to author: Wrong len argument [ 935.441607] should_failslab+0x9/0x14 [ 935.441628] __kmalloc_track_caller+0x2c4/0x760 [ 935.441656] ? strncpy_from_user+0x500/0x500 [ 935.441677] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 935.441698] ? strndup_user+0x77/0xd0 [ 935.441720] memdup_user+0x2c/0xa0 [ 935.448265] kernel msg: ebtables bug: please report to author: Wrong len argument [ 935.450489] strndup_user+0x77/0xd0 [ 935.450516] ksys_mount+0x73/0x140 [ 935.450541] __x64_sys_mount+0xbe/0x150 [ 935.450563] ? do_syscall_64+0x19b/0x800 [ 935.450581] do_syscall_64+0x1b1/0x800 [ 935.450600] ? finish_task_switch+0x1ca/0x840 [ 935.492803] kernel msg: ebtables bug: please report to author: Wrong len argument [ 935.495256] ? syscall_return_slowpath+0x5c0/0x5c0 [ 935.495278] ? syscall_return_slowpath+0x30f/0x5c0 [ 935.495309] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 935.495339] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 935.495370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.495384] RIP: 0033:0x455a09 [ 935.495398] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 2033/05/18 03:47:21 executing program 6 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 935.501555] kernel msg: ebtables bug: please report to author: Wrong len argument [ 935.502899] ORIG_RAX: 00000000000000a5 [ 935.502912] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 935.502924] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 935.502936] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 935.502947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 935.502959] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000001 [ 935.594484] FAULT_INJECTION: forcing a failure. [ 935.594484] name failslab, interval 1, probability 0, space 0, times 0 [ 935.599319] device lo left promiscuous mode [ 935.605724] CPU: 0 PID: 21327 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 935.605744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.627239] device lo entered promiscuous mode [ 935.628553] Call Trace: [ 935.628583] dump_stack+0x1b9/0x294 [ 935.628610] ? dump_stack_print_info.cold.2+0x52/0x52 [ 935.653979] should_fail.cold.4+0xa/0x1a 2033/05/18 03:47:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}) [ 935.658056] ? zap_class+0x720/0x720 [ 935.661797] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 935.666920] ? kasan_kmalloc+0xc4/0xe0 [ 935.670829] ? strndup_user+0x77/0xd0 [ 935.674739] ? graph_lock+0x170/0x170 [ 935.678557] ? proc_fail_nth_write+0x96/0x1f0 [ 935.683085] ? find_held_lock+0x36/0x1c0 [ 935.687194] ? check_same_owner+0x320/0x320 [ 935.691527] ? lock_release+0xa10/0xa10 [ 935.695530] ? check_same_owner+0x320/0x320 [ 935.699876] ? rcu_note_context_switch+0x710/0x710 2033/05/18 03:47:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000600"}, 0x2c) 2033/05/18 03:47:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 935.704825] ? __check_object_size+0x95/0x5d9 [ 935.709353] __should_failslab+0x124/0x180 [ 935.713615] should_failslab+0x9/0x14 [ 935.717443] kmem_cache_alloc_trace+0x2cb/0x780 [ 935.722146] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 935.727714] ? _copy_from_user+0xdf/0x150 [ 935.731892] copy_mount_options+0x5f/0x380 [ 935.736151] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 935.741729] ksys_mount+0xd0/0x140 [ 935.745296] __x64_sys_mount+0xbe/0x150 [ 935.749372] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 935.754418] do_syscall_64+0x1b1/0x800 [ 935.758330] ? finish_task_switch+0x1ca/0x840 [ 935.762852] ? syscall_return_slowpath+0x5c0/0x5c0 [ 935.767810] ? syscall_return_slowpath+0x30f/0x5c0 [ 935.772775] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 935.778174] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 935.783056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.788275] RIP: 0033:0x455a09 [ 935.793999] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 935.801739] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 935.809033] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 935.816327] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 935.821330] kernel msg: ebtables bug: please report to author: Wrong len argument [ 935.823641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 935.823654] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000002 2033/05/18 03:47:21 executing program 6 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 935.857964] device lo left promiscuous mode [ 935.867635] device lo entered promiscuous mode [ 935.904415] device lo left promiscuous mode [ 935.917210] FAULT_INJECTION: forcing a failure. [ 935.917210] name failslab, interval 1, probability 0, space 0, times 0 [ 935.928665] CPU: 0 PID: 21348 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 935.935963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.945342] Call Trace: 2033/05/18 03:47:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000]}}) 2033/05/18 03:47:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 935.946752] kernel msg: ebtables bug: please report to author: Wrong len argument [ 935.947964] dump_stack+0x1b9/0x294 [ 935.947992] ? dump_stack_print_info.cold.2+0x52/0x52 [ 935.964553] ? finish_task_switch+0x1ca/0x840 [ 935.969072] ? finish_task_switch+0x182/0x840 [ 935.973604] should_fail.cold.4+0xa/0x1a [ 935.977705] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 935.982852] ? __schedule+0x809/0x1e30 [ 935.986764] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 935.992085] ? __sched_text_start+0x8/0x8 [ 935.996258] ? find_held_lock+0x36/0x1c0 [ 936.000375] ? check_same_owner+0x320/0x320 [ 936.004741] ? save_stack+0xa9/0xd0 [ 936.008400] __should_failslab+0x124/0x180 [ 936.012666] should_failslab+0x9/0x14 [ 936.016498] kmem_cache_alloc+0x2af/0x760 [ 936.020702] getname_flags+0xd0/0x5a0 [ 936.024532] user_path_at_empty+0x2d/0x50 [ 936.028711] do_mount+0x172/0x3070 [ 936.032280] ? copy_mount_string+0x40/0x40 [ 936.036535] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 936.041575] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 936.046363] ? retint_kernel+0x10/0x10 [ 936.050284] ? copy_mount_options+0x1a1/0x380 [ 936.054807] ? copy_mount_options+0x1a4/0x380 [ 936.059329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 936.064887] ? copy_mount_options+0x285/0x380 [ 936.069417] ksys_mount+0x12d/0x140 [ 936.073073] __x64_sys_mount+0xbe/0x150 [ 936.077070] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 936.082107] do_syscall_64+0x1b1/0x800 [ 936.086110] ? finish_task_switch+0x1ca/0x840 [ 936.090636] ? syscall_return_slowpath+0x5c0/0x5c0 [ 936.095602] ? syscall_return_slowpath+0x30f/0x5c0 2033/05/18 03:47:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\a\x00'}) 2033/05/18 03:47:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}}) 2033/05/18 03:47:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000600"}, 0x2c) [ 936.100562] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 936.105983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 936.110856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.116060] RIP: 0033:0x455a09 [ 936.119259] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 936.126996] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 936.134287] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 936.141580] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 936.148869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 936.156161] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000003 [ 936.172631] device lo entered promiscuous mode [ 936.182285] device lo entered promiscuous mode [ 936.189226] device lo left promiscuous mode [ 936.206377] device lo left promiscuous mode [ 936.216930] device lo entered promiscuous mode [ 936.235336] device lo left promiscuous mode 2033/05/18 03:47:22 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000ffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:22 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x800454e1, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00`\x00'}) 2033/05/18 03:47:22 executing program 6 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000048f00"}, 0x2c) 2033/05/18 03:47:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00]}}) 2033/05/18 03:47:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000000ffffffc300"}) 2033/05/18 03:47:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 936.326204] kernel msg: ebtables bug: please report to author: Wrong len argument [ 936.343428] device lo entered promiscuous mode [ 936.356934] FAULT_INJECTION: forcing a failure. [ 936.356934] name failslab, interval 1, probability 0, space 0, times 0 [ 936.368350] CPU: 0 PID: 21396 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 2033/05/18 03:47:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000048f00"}, 0x2c) [ 936.375657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.385030] Call Trace: [ 936.387658] dump_stack+0x1b9/0x294 [ 936.391330] ? dump_stack_print_info.cold.2+0x52/0x52 [ 936.396571] should_fail.cold.4+0xa/0x1a [ 936.400676] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 936.405825] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 936.411043] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 936.415715] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:22 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 936.416269] ? find_held_lock+0x36/0x1c0 [ 936.416334] ? check_same_owner+0x320/0x320 [ 936.416355] ? rcu_note_context_switch+0x710/0x710 [ 936.416377] ? save_stack+0xa9/0xd0 [ 936.440961] __should_failslab+0x124/0x180 [ 936.445225] should_failslab+0x9/0x14 [ 936.449053] kmem_cache_alloc+0x2af/0x760 [ 936.453229] ? find_held_lock+0x36/0x1c0 [ 936.457335] getname_flags+0xd0/0x5a0 [ 936.461168] user_path_at_empty+0x2d/0x50 [ 936.465348] do_mount+0x172/0x3070 [ 936.468917] ? do_raw_spin_unlock+0x9e/0x2e0 2033/05/18 03:47:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 936.473358] ? copy_mount_string+0x40/0x40 [ 936.476552] kernel msg: ebtables bug: please report to author: Wrong len argument [ 936.477609] ? rcu_pm_notify+0xc0/0xc0 [ 936.477652] ? copy_mount_options+0x5f/0x380 [ 936.477670] ? rcu_read_lock_sched_held+0x108/0x120 [ 936.477692] ? kmem_cache_alloc_trace+0x616/0x780 [ 936.477721] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 936.477750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 936.477769] ? copy_mount_options+0x285/0x380 [ 936.488051] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:22 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 936.489294] ksys_mount+0x12d/0x140 [ 936.489320] __x64_sys_mount+0xbe/0x150 [ 936.489338] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 936.489364] do_syscall_64+0x1b1/0x800 [ 936.489381] ? finish_task_switch+0x1ca/0x840 [ 936.489401] ? syscall_return_slowpath+0x5c0/0x5c0 [ 936.552744] ? syscall_return_slowpath+0x30f/0x5c0 [ 936.557719] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 936.563122] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 936.566769] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:22 executing program 6 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 936.568022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.568038] RIP: 0033:0x455a09 [ 936.568049] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 936.568070] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 936.568082] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 936.568094] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 936.568105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 936.568116] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000004 [ 936.629352] device lo left promiscuous mode [ 936.635440] device lo entered promiscuous mode [ 936.649210] device lo left promiscuous mode [ 936.663502] device lo entered promiscuous mode [ 936.666312] FAULT_INJECTION: forcing a failure. [ 936.666312] name failslab, interval 1, probability 0, space 0, times 0 [ 936.679630] CPU: 0 PID: 21420 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 936.686934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.690193] kernel msg: ebtables bug: please report to author: Wrong len argument [ 936.696304] Call Trace: [ 936.696335] dump_stack+0x1b9/0x294 [ 936.696363] ? dump_stack_print_info.cold.2+0x52/0x52 [ 936.696386] ? finish_task_switch+0x1ca/0x840 [ 936.696402] ? finish_task_switch+0x182/0x840 2033/05/18 03:47:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000]}}) 2033/05/18 03:47:22 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:22 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 936.696430] should_fail.cold.4+0xa/0x1a [ 936.728500] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 936.733660] ? __schedule+0x809/0x1e30 [ 936.737598] ? __sched_text_start+0x8/0x8 [ 936.741777] ? find_held_lock+0x36/0x1c0 [ 936.745804] kernel msg: ebtables bug: please report to author: Wrong len argument [ 936.745890] ? check_same_owner+0x320/0x320 [ 936.755653] kernel msg: ebtables bug: please report to author: Wrong len argument [ 936.757801] ? kmem_cache_free+0x86/0x2d0 [ 936.757820] ? putname+0xf2/0x130 [ 936.757839] ? do_mount+0x172/0x3070 [ 936.757854] ? ksys_mount+0x12d/0x140 [ 936.757870] ? __x64_sys_mount+0xbe/0x150 [ 936.757887] ? do_syscall_64+0x1b1/0x800 [ 936.757908] __should_failslab+0x124/0x180 [ 936.793868] should_failslab+0x9/0x14 [ 936.797697] kmem_cache_alloc+0x2af/0x760 [ 936.801877] ? kasan_check_write+0x14/0x20 [ 936.806138] ? do_raw_spin_lock+0xc1/0x200 [ 936.810412] alloc_vfsmnt+0xe0/0x9d0 [ 936.814152] ? mnt_free_id.isra.27+0x60/0x60 [ 936.818592] ? kasan_check_read+0x11/0x20 [ 936.822769] ? graph_lock+0x170/0x170 2033/05/18 03:47:22 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 936.826596] ? trace_hardirqs_off+0xd/0x10 [ 936.830864] ? putname+0xf2/0x130 [ 936.834383] ? putname+0xf2/0x130 [ 936.835791] kernel msg: ebtables bug: please report to author: Wrong len argument [ 936.837863] ? find_held_lock+0x36/0x1c0 [ 936.837904] ? lock_downgrade+0x8e0/0x8e0 [ 936.837924] ? module_unload_free+0x5b0/0x5b0 [ 936.837944] ? lock_release+0xa10/0xa10 [ 936.837959] ? retint_kernel+0x10/0x10 [ 936.837992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 936.853709] kernel msg: ebtables bug: please report to author: Wrong len argument [ 936.853829] vfs_kern_mount.part.34+0x88/0x4d0 [ 936.883906] ? may_umount+0xb0/0xb0 [ 936.887567] ? _raw_read_unlock+0x22/0x30 [ 936.891748] ? __get_fs_type+0x97/0xc0 [ 936.895674] do_mount+0x564/0x3070 [ 936.899254] ? copy_mount_string+0x40/0x40 [ 936.899486] kernel msg: ebtables bug: please report to author: Wrong len argument [ 936.903506] ? rcu_pm_notify+0xc0/0xc0 [ 936.903542] ? copy_mount_options+0x5f/0x380 [ 936.903561] ? rcu_read_lock_sched_held+0x108/0x120 [ 936.903583] ? kmem_cache_alloc_trace+0x616/0x780 [ 936.903627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 936.903646] ? copy_mount_options+0x285/0x380 [ 936.913749] kernel msg: ebtables bug: please report to author: Wrong len argument [ 936.915164] ksys_mount+0x12d/0x140 [ 936.915190] __x64_sys_mount+0xbe/0x150 [ 936.915209] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 936.915232] do_syscall_64+0x1b1/0x800 [ 936.915252] ? finish_task_switch+0x1ca/0x840 [ 936.968127] ? syscall_return_slowpath+0x5c0/0x5c0 [ 936.973069] ? syscall_return_slowpath+0x30f/0x5c0 [ 936.978011] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 936.983389] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 936.988248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.993430] RIP: 0033:0x455a09 [ 936.996610] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 937.004310] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 937.011581] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 937.018871] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 2033/05/18 03:47:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x5452, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 937.026143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 937.033407] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000005 [ 937.044132] device lo left promiscuous mode [ 937.063968] device lo entered promiscuous mode 2033/05/18 03:47:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000f00"}) 2033/05/18 03:47:23 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:23 executing program 6 (fault-call:2 fault-nth:6): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 937.088549] device lo left promiscuous mode [ 937.127330] kernel msg: ebtables bug: please report to author: Wrong len argument [ 937.146675] FAULT_INJECTION: forcing a failure. [ 937.146675] name failslab, interval 1, probability 0, space 0, times 0 [ 937.158193] CPU: 0 PID: 21445 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 937.158595] kernel msg: ebtables bug: please report to author: Wrong len argument [ 937.165480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.165490] Call Trace: [ 937.165519] dump_stack+0x1b9/0x294 [ 937.165546] ? dump_stack_print_info.cold.2+0x52/0x52 [ 937.165567] ? perf_tp_event+0xc30/0xc30 [ 937.198983] should_fail.cold.4+0xa/0x1a [ 937.203071] ? memset+0x31/0x40 [ 937.206383] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 937.211513] ? perf_trace_lock+0x495/0x900 [ 937.215792] ? zap_class+0x720/0x720 [ 937.219528] ? kmem_cache_alloc+0x12e/0x760 [ 937.223877] ? vfs_kern_mount.part.34+0x88/0x4d0 [ 937.228659] ? find_held_lock+0x36/0x1c0 [ 937.232759] ? __kprobes_text_end+0x153e8/0x110578 [ 937.237750] ? check_same_owner+0x320/0x320 [ 937.242110] ? rcu_note_context_switch+0x710/0x710 [ 937.248230] __should_failslab+0x124/0x180 [ 937.252497] should_failslab+0x9/0x14 [ 937.256327] __kmalloc_track_caller+0x2c4/0x760 [ 937.261033] ? kasan_check_read+0x11/0x20 [ 937.265209] ? do_raw_spin_unlock+0x9e/0x2e0 [ 937.269648] ? kstrdup_const+0x66/0x80 [ 937.273572] kstrdup+0x39/0x70 [ 937.276792] kstrdup_const+0x66/0x80 [ 937.280524] alloc_vfsmnt+0x1b3/0x9d0 [ 937.284347] ? mnt_free_id.isra.27+0x60/0x60 [ 937.288867] ? kasan_check_read+0x11/0x20 [ 937.293035] ? graph_lock+0x170/0x170 [ 937.296856] ? trace_hardirqs_off+0xd/0x10 [ 937.301122] ? putname+0xf2/0x130 [ 937.304597] ? putname+0xf2/0x130 [ 937.308067] ? find_held_lock+0x36/0x1c0 [ 937.312172] ? lock_downgrade+0x8e0/0x8e0 [ 937.316343] ? module_unload_free+0x5b0/0x5b0 [ 937.320861] ? lock_release+0xa10/0xa10 [ 937.324849] ? mpi_free.cold.1+0x19/0x19 [ 937.328908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 937.334440] vfs_kern_mount.part.34+0x88/0x4d0 [ 937.339027] ? may_umount+0xb0/0xb0 [ 937.342684] ? _raw_read_unlock+0x22/0x30 [ 937.346828] ? __get_fs_type+0x97/0xc0 [ 937.350716] do_mount+0x564/0x3070 [ 937.354270] ? copy_mount_string+0x40/0x40 [ 937.358499] ? rcu_pm_notify+0xc0/0xc0 [ 937.362385] ? copy_mount_options+0x5f/0x380 [ 937.366783] ? rcu_read_lock_sched_held+0x108/0x120 [ 937.371805] ? kmem_cache_alloc_trace+0x616/0x780 [ 937.376646] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 937.382182] ? _copy_from_user+0xdf/0x150 [ 937.386346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 937.391892] ? copy_mount_options+0x285/0x380 [ 937.396402] ksys_mount+0x12d/0x140 [ 937.400038] __x64_sys_mount+0xbe/0x150 [ 937.404009] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 937.409046] do_syscall_64+0x1b1/0x800 [ 937.412935] ? finish_task_switch+0x1ca/0x840 [ 937.417432] ? syscall_return_slowpath+0x5c0/0x5c0 [ 937.422353] ? syscall_return_slowpath+0x30f/0x5c0 [ 937.427295] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 937.432654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 937.437494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.442683] RIP: 0033:0x455a09 [ 937.445858] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 937.453561] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 937.460822] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 937.468078] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 937.475336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 937.482596] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000006 [ 937.499194] device lo entered promiscuous mode [ 937.506942] device lo left promiscuous mode [ 937.523950] device lo entered promiscuous mode 2033/05/18 03:47:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000000600"}, 0x2c) 2033/05/18 03:47:23 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}}) 2033/05/18 03:47:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}) 2033/05/18 03:47:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000000048f"}, 0x2c) 2033/05/18 03:47:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0xc020660b, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00@\x00'}) 2033/05/18 03:47:23 executing program 6 (fault-call:2 fault-nth:7): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 937.537602] device lo left promiscuous mode 2033/05/18 03:47:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00]}}) [ 937.585162] FAULT_INJECTION: forcing a failure. [ 937.585162] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 937.597144] CPU: 0 PID: 21460 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 937.604444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.613818] Call Trace: [ 937.616442] dump_stack+0x1b9/0x294 [ 937.620108] ? dump_stack_print_info.cold.2+0x52/0x52 [ 937.625334] ? zap_class+0x720/0x720 [ 937.629092] should_fail.cold.4+0xa/0x1a [ 937.633275] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 937.638417] ? pcpu_balance_workfn+0x16d0/0x16d0 [ 937.643208] ? find_held_lock+0x36/0x1c0 [ 937.647333] ? check_same_owner+0x320/0x320 [ 937.651682] ? __lockdep_init_map+0x105/0x590 [ 937.656207] ? rcu_note_context_switch+0x710/0x710 [ 937.661179] ? lockdep_init_map+0x9/0x10 [ 937.665285] ? __might_sleep+0x95/0x190 [ 937.669297] __alloc_pages_nodemask+0x34e/0xd70 [ 937.674011] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 937.679056] ? kasan_check_read+0x11/0x20 2033/05/18 03:47:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}}) [ 937.683233] ? trace_hardirqs_off+0xd/0x10 [ 937.687451] device lo entered promiscuous mode [ 937.687491] ? putname+0xf2/0x130 [ 937.695655] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 937.701227] alloc_pages_current+0x10c/0x210 [ 937.705676] __get_free_pages+0xf/0x40 [ 937.709588] get_zeroed_page+0x11/0x20 [ 937.713496] mount_fs+0x210/0x328 [ 937.716974] ? mpi_free.cold.1+0x19/0x19 [ 937.721065] vfs_kern_mount.part.34+0xd4/0x4d0 [ 937.725677] ? may_umount+0xb0/0xb0 [ 937.729332] ? _raw_read_unlock+0x22/0x30 2033/05/18 03:47:23 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 937.733506] ? __get_fs_type+0x97/0xc0 [ 937.737447] do_mount+0x564/0x3070 [ 937.741025] ? copy_mount_string+0x40/0x40 [ 937.741323] kernel msg: ebtables bug: please report to author: Wrong len argument [ 937.745275] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 937.745299] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 937.745330] ? retint_kernel+0x10/0x10 [ 937.745366] ? copy_mount_options+0x1f0/0x380 [ 937.745384] ? copy_mount_options+0x1fa/0x380 [ 937.745404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 937.745423] ? copy_mount_options+0x285/0x380 [ 937.755327] kernel msg: ebtables bug: please report to author: Wrong len argument [ 937.758250] ksys_mount+0x12d/0x140 [ 937.758275] __x64_sys_mount+0xbe/0x150 [ 937.758294] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 937.758319] do_syscall_64+0x1b1/0x800 [ 937.758337] ? finish_task_switch+0x1ca/0x840 [ 937.758362] ? syscall_return_slowpath+0x5c0/0x5c0 [ 937.809361] kernel msg: ebtables bug: please report to author: Wrong len argument [ 937.810144] ? syscall_return_slowpath+0x30f/0x5c0 [ 937.810174] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 937.810204] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 937.810235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.810250] RIP: 0033:0x455a09 [ 937.810261] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 937.810282] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 937.810300] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 937.816787] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:23 executing program 6 (fault-call:2 fault-nth:8): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 937.819712] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 937.819723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 937.819734] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000007 [ 937.905480] device lo left promiscuous mode [ 937.921526] FAULT_INJECTION: forcing a failure. [ 937.921526] name failslab, interval 1, probability 0, space 0, times 0 [ 937.924579] device lo entered promiscuous mode [ 937.933100] CPU: 0 PID: 21493 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 937.944842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.954220] Call Trace: [ 937.956837] dump_stack+0x1b9/0x294 [ 937.960500] ? dump_stack_print_info.cold.2+0x52/0x52 [ 937.965749] should_fail.cold.4+0xa/0x1a [ 937.969851] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 937.974996] ? memset+0x31/0x40 [ 937.978310] ? perf_trace_lock+0x495/0x900 [ 937.982592] ? find_held_lock+0x36/0x1c0 2033/05/18 03:47:24 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000008f04"}, 0x2c) [ 937.986726] ? check_same_owner+0x320/0x320 [ 937.991087] ? rcu_note_context_switch+0x710/0x710 [ 937.996051] ? find_held_lock+0x36/0x1c0 [ 938.000149] __should_failslab+0x124/0x180 [ 938.004418] should_failslab+0x9/0x14 [ 938.008245] kmem_cache_alloc_trace+0x2cb/0x780 [ 938.012949] ? lock_downgrade+0x8e0/0x8e0 [ 938.017134] ? refcount_add_not_zero+0x320/0x320 [ 938.021933] kernfs_mount_ns+0xb5/0x8e0 [ 938.025972] ? kernfs_super_ns+0x70/0x70 [ 938.030085] sysfs_mount+0xdf/0x200 2033/05/18 03:47:24 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 938.032442] kernel msg: ebtables bug: please report to author: Wrong len argument [ 938.033740] ? sysfs_kill_sb+0x40/0x40 [ 938.033766] ? alloc_pages_current+0x114/0x210 [ 938.033792] ? security_sb_copy_data+0x88/0xb0 [ 938.033818] mount_fs+0xae/0x328 [ 938.033850] vfs_kern_mount.part.34+0xd4/0x4d0 [ 938.033873] ? may_umount+0xb0/0xb0 [ 938.033894] ? _raw_read_unlock+0x22/0x30 [ 938.044588] kernel msg: ebtables bug: please report to author: Wrong len argument [ 938.045406] ? __get_fs_type+0x97/0xc0 [ 938.045434] do_mount+0x564/0x3070 2033/05/18 03:47:24 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 938.045453] ? interrupt_entry+0xb1/0xf0 [ 938.045479] ? copy_mount_string+0x40/0x40 [ 938.045510] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 938.045540] ? retint_kernel+0x10/0x10 [ 938.045567] ? copy_mount_options+0x1e3/0x380 [ 938.093901] kernel msg: ebtables bug: please report to author: Wrong len argument [ 938.098599] ? write_comp_data+0x1b/0x70 [ 938.098626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 938.098645] ? copy_mount_options+0x285/0x380 [ 938.098673] ksys_mount+0x12d/0x140 [ 938.098698] __x64_sys_mount+0xbe/0x150 [ 938.098715] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 938.098737] do_syscall_64+0x1b1/0x800 [ 938.098757] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 938.105529] kernel msg: ebtables bug: please report to author: Wrong len argument [ 938.107143] ? syscall_return_slowpath+0x5c0/0x5c0 [ 938.107166] ? syscall_return_slowpath+0x30f/0x5c0 [ 938.107196] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 938.107225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 938.107250] entry_SYSCALL_64_after_hwframe+0x49/0xbe 2033/05/18 03:47:24 executing program 6 (fault-call:2 fault-nth:9): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 938.148818] kernel msg: ebtables bug: please report to author: Wrong len argument [ 938.150258] RIP: 0033:0x455a09 [ 938.150270] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 938.150291] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 938.150303] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 938.150315] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 938.150326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 938.150337] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000008 [ 938.238496] FAULT_INJECTION: forcing a failure. [ 938.238496] name failslab, interval 1, probability 0, space 0, times 0 [ 938.239616] device lo left promiscuous mode [ 938.250470] CPU: 0 PID: 21515 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 938.256334] device lo entered promiscuous mode [ 938.262046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.262056] Call Trace: [ 938.262084] dump_stack+0x1b9/0x294 [ 938.262109] ? dump_stack_print_info.cold.2+0x52/0x52 [ 938.287537] ? finish_task_switch+0x1ca/0x840 [ 938.292049] ? finish_task_switch+0x182/0x840 [ 938.296585] should_fail.cold.4+0xa/0x1a [ 938.300693] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 938.305837] ? __schedule+0x809/0x1e30 [ 938.309772] ? __sched_text_start+0x8/0x8 [ 938.313951] ? find_held_lock+0x36/0x1c0 [ 938.317975] kernel msg: ebtables bug: please report to author: Wrong len argument [ 938.325684] ? check_same_owner+0x320/0x320 [ 938.325718] __should_failslab+0x124/0x180 [ 938.334294] should_failslab+0x9/0x14 2033/05/18 03:47:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}) [ 938.338120] kmem_cache_alloc_trace+0x2cb/0x780 [ 938.342817] ? kasan_check_write+0x14/0x20 [ 938.347080] ? do_raw_spin_lock+0xc1/0x200 [ 938.351353] sget_userns+0x1c7/0xf00 [ 938.355090] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 938.359785] ? kernfs_sop_show_options+0x190/0x190 [ 938.364745] ? destroy_unused_super.part.11+0x110/0x110 [ 938.370157] ? kasan_check_read+0x11/0x20 [ 938.374332] ? rcu_is_watching+0x85/0x140 [ 938.378531] ? rcu_pm_notify+0xc0/0xc0 [ 938.382462] ? kernfs_mount_ns+0xb5/0x8e0 [ 938.386639] ? rcu_read_lock_sched_held+0x108/0x120 [ 938.391686] ? kmem_cache_alloc_trace+0x616/0x780 [ 938.396557] ? lock_downgrade+0x8e0/0x8e0 [ 938.400739] ? refcount_add_not_zero+0x320/0x320 [ 938.405545] kernfs_mount_ns+0x13d/0x8e0 [ 938.409642] ? kernfs_super_ns+0x70/0x70 [ 938.413745] sysfs_mount+0xdf/0x200 [ 938.417388] ? sysfs_kill_sb+0x40/0x40 [ 938.421288] ? alloc_pages_current+0x114/0x210 [ 938.425878] ? security_sb_copy_data+0x88/0xb0 [ 938.430456] mount_fs+0xae/0x328 [ 938.433824] vfs_kern_mount.part.34+0xd4/0x4d0 [ 938.438400] ? may_umount+0xb0/0xb0 [ 938.442035] ? _raw_read_unlock+0x22/0x30 [ 938.446193] ? __get_fs_type+0x97/0xc0 [ 938.450107] do_mount+0x564/0x3070 [ 938.453651] ? copy_mount_string+0x40/0x40 [ 938.457877] ? rcu_pm_notify+0xc0/0xc0 [ 938.461764] ? copy_mount_options+0x5f/0x380 [ 938.466185] ? rcu_read_lock_sched_held+0x108/0x120 [ 938.471222] ? kmem_cache_alloc_trace+0x616/0x780 [ 938.476079] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 938.481619] ? _copy_from_user+0xdf/0x150 [ 938.485769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 938.491300] ? copy_mount_options+0x285/0x380 [ 938.495793] ksys_mount+0x12d/0x140 [ 938.499435] __x64_sys_mount+0xbe/0x150 [ 938.503420] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 938.508439] do_syscall_64+0x1b1/0x800 [ 938.512326] ? finish_task_switch+0x1ca/0x840 [ 938.516825] ? syscall_return_slowpath+0x5c0/0x5c0 [ 938.521768] ? syscall_return_slowpath+0x30f/0x5c0 [ 938.526723] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 938.532099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 938.536942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 938.542209] RIP: 0033:0x455a09 [ 938.545387] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 938.553110] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 938.560378] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 938.567655] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 938.574926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 938.582189] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000009 [ 938.591615] device lo left promiscuous mode [ 938.603953] device lo entered promiscuous mode [ 938.611601] device lo left promiscuous mode 2033/05/18 03:47:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00?\x00'}) 2033/05/18 03:47:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0xc0045878, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:24 executing program 6 (fault-call:2 fault-nth:10): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000]}}) 2033/05/18 03:47:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000600"}, 0x2c) 2033/05/18 03:47:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000fffffdfd00"}) 2033/05/18 03:47:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000001"}, 0x2c) 2033/05/18 03:47:24 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 938.715464] FAULT_INJECTION: forcing a failure. [ 938.715464] name failslab, interval 1, probability 0, space 0, times 0 [ 938.727405] CPU: 0 PID: 21530 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 938.731260] kernel msg: ebtables bug: please report to author: Wrong len argument [ 938.734709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.751758] Call Trace: [ 938.754386] dump_stack+0x1b9/0x294 [ 938.758055] ? dump_stack_print_info.cold.2+0x52/0x52 2033/05/18 03:47:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 938.763294] should_fail.cold.4+0xa/0x1a [ 938.767389] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 938.771172] kernel msg: ebtables bug: please report to author: Wrong len argument [ 938.772544] ? graph_lock+0x170/0x170 [ 938.772568] ? save_stack+0x43/0xd0 [ 938.772584] ? kasan_kmalloc+0xc4/0xe0 [ 938.772604] ? __kmalloc+0x14e/0x760 [ 938.795235] ? __list_lru_init+0xdd/0x790 [ 938.799414] ? find_held_lock+0x36/0x1c0 [ 938.803523] ? __lock_is_held+0xb5/0x140 [ 938.807633] ? check_same_owner+0x320/0x320 2033/05/18 03:47:24 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 938.811990] ? rcu_note_context_switch+0x710/0x710 [ 938.816954] __should_failslab+0x124/0x180 [ 938.821221] should_failslab+0x9/0x14 [ 938.825049] kmem_cache_alloc_node_trace+0x26f/0x770 [ 938.830173] ? mark_held_locks+0xc9/0x160 [ 938.834357] ? __raw_spin_lock_init+0x1c/0x100 [ 938.838981] __kmalloc_node+0x33/0x70 [ 938.839393] kernel msg: ebtables bug: please report to author: Wrong len argument [ 938.842806] kvmalloc_node+0x6b/0x100 [ 938.842830] __list_lru_init+0x559/0x790 [ 938.842857] ? list_lru_destroy+0x4c0/0x4c0 2033/05/18 03:47:24 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000ffffffffffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 938.842877] ? mark_held_locks+0xc9/0x160 [ 938.842901] ? __raw_spin_lock_init+0x1c/0x100 [ 938.842922] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 938.842944] ? __lockdep_init_map+0x105/0x590 [ 938.853452] kernel msg: ebtables bug: please report to author: Wrong len argument [ 938.854381] ? lockdep_init_map+0x9/0x10 [ 938.854408] sget_userns+0x73a/0xf00 [ 938.854432] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 938.854462] ? kernfs_sop_show_options+0x190/0x190 [ 938.906052] ? destroy_unused_super.part.11+0x110/0x110 [ 938.911484] ? kasan_check_read+0x11/0x20 [ 938.913785] kernel msg: ebtables bug: please report to author: Wrong len argument [ 938.915656] ? rcu_is_watching+0x85/0x140 [ 938.915678] ? rcu_pm_notify+0xc0/0xc0 [ 938.915716] ? rcu_read_lock_sched_held+0x108/0x120 [ 938.915738] ? kmem_cache_alloc_trace+0x616/0x780 [ 938.915757] ? lock_downgrade+0x8e0/0x8e0 [ 938.915779] ? refcount_add_not_zero+0x320/0x320 [ 938.915806] kernfs_mount_ns+0x13d/0x8e0 [ 938.926377] kernel msg: ebtables bug: please report to author: Wrong len argument [ 938.927582] ? kernfs_super_ns+0x70/0x70 2033/05/18 03:47:25 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 938.927623] sysfs_mount+0xdf/0x200 [ 938.927645] ? sysfs_kill_sb+0x40/0x40 [ 938.927669] ? alloc_pages_current+0x114/0x210 [ 938.927689] ? security_sb_copy_data+0x88/0xb0 [ 938.982746] mount_fs+0xae/0x328 [ 938.986162] vfs_kern_mount.part.34+0xd4/0x4d0 [ 938.990779] ? may_umount+0xb0/0xb0 [ 938.994435] ? _raw_read_unlock+0x22/0x30 [ 938.998604] ? __get_fs_type+0x97/0xc0 [ 939.002118] kernel msg: ebtables bug: please report to author: Wrong len argument [ 939.002522] do_mount+0x564/0x3070 2033/05/18 03:47:25 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 939.002555] ? copy_mount_string+0x40/0x40 [ 939.002575] ? rcu_pm_notify+0xc0/0xc0 [ 939.002611] ? copy_mount_options+0x5f/0x380 [ 939.002628] ? rcu_read_lock_sched_held+0x108/0x120 [ 939.002652] ? kmem_cache_alloc_trace+0x616/0x780 [ 939.019810] kernel msg: ebtables bug: please report to author: Wrong len argument [ 939.021951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 939.021972] ? copy_mount_options+0x285/0x380 [ 939.022001] ksys_mount+0x12d/0x140 [ 939.022026] __x64_sys_mount+0xbe/0x150 [ 939.022044] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 939.022067] do_syscall_64+0x1b1/0x800 [ 939.071064] ? finish_task_switch+0x1ca/0x840 [ 939.075589] ? syscall_return_slowpath+0x5c0/0x5c0 [ 939.077286] kernel msg: ebtables bug: please report to author: Wrong len argument [ 939.080543] ? syscall_return_slowpath+0x30f/0x5c0 [ 939.080573] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 939.080603] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 939.080634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.080648] RIP: 0033:0x455a09 2033/05/18 03:47:25 executing program 6 (fault-call:2 fault-nth:11): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 939.080659] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 939.080679] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 939.080695] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 939.098918] kernel msg: ebtables bug: please report to author: Wrong len argument [ 939.103539] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 939.103550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 939.103559] R13: 00000000000004a5 R14: 00000000006fb018 R15: 000000000000000a [ 939.171988] device lo entered promiscuous mode [ 939.183414] device lo entered promiscuous mode [ 939.186355] FAULT_INJECTION: forcing a failure. [ 939.186355] name failslab, interval 1, probability 0, space 0, times 0 [ 939.199674] CPU: 0 PID: 21567 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 939.206969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.216339] Call Trace: [ 939.218947] dump_stack+0x1b9/0x294 [ 939.222614] ? dump_stack_print_info.cold.2+0x52/0x52 [ 939.227852] should_fail.cold.4+0xa/0x1a [ 939.231940] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 939.237081] ? graph_lock+0x170/0x170 [ 939.240893] ? save_stack+0x43/0xd0 [ 939.244512] ? kasan_kmalloc+0xc4/0xe0 [ 939.248390] ? __kmalloc+0x14e/0x760 [ 939.252090] ? __list_lru_init+0xdd/0x790 [ 939.256228] ? find_held_lock+0x36/0x1c0 [ 939.260283] ? __lock_is_held+0xb5/0x140 [ 939.264347] ? check_same_owner+0x320/0x320 [ 939.268662] ? rcu_note_context_switch+0x710/0x710 [ 939.273584] __should_failslab+0x124/0x180 [ 939.277810] should_failslab+0x9/0x14 [ 939.281600] kmem_cache_alloc_node_trace+0x26f/0x770 [ 939.286694] ? mark_held_locks+0xc9/0x160 [ 939.290835] ? __raw_spin_lock_init+0x1c/0x100 [ 939.295416] __kmalloc_node+0x33/0x70 [ 939.299208] kvmalloc_node+0x6b/0x100 [ 939.302998] __list_lru_init+0x559/0x790 [ 939.307057] ? list_lru_destroy+0x4c0/0x4c0 [ 939.311368] ? mark_held_locks+0xc9/0x160 [ 939.315517] ? __raw_spin_lock_init+0x1c/0x100 [ 939.320087] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 939.325092] ? __lockdep_init_map+0x105/0x590 [ 939.329576] ? lockdep_init_map+0x9/0x10 [ 939.333635] sget_userns+0x73a/0xf00 [ 939.337334] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 939.341991] ? kernfs_sop_show_options+0x190/0x190 [ 939.346914] ? destroy_unused_super.part.11+0x110/0x110 [ 939.352289] ? kasan_check_read+0x11/0x20 [ 939.356428] ? rcu_is_watching+0x85/0x140 [ 939.360564] ? rcu_pm_notify+0xc0/0xc0 [ 939.364450] ? rcu_read_lock_sched_held+0x108/0x120 [ 939.369454] ? kmem_cache_alloc_trace+0x616/0x780 [ 939.374281] ? lock_downgrade+0x8e0/0x8e0 [ 939.378420] ? refcount_add_not_zero+0x320/0x320 [ 939.383170] kernfs_mount_ns+0x13d/0x8e0 [ 939.387222] ? kernfs_super_ns+0x70/0x70 [ 939.391279] sysfs_mount+0xdf/0x200 [ 939.394892] ? sysfs_kill_sb+0x40/0x40 [ 939.398766] ? alloc_pages_current+0x114/0x210 [ 939.403337] ? security_sb_copy_data+0x88/0xb0 [ 939.407908] mount_fs+0xae/0x328 [ 939.411265] vfs_kern_mount.part.34+0xd4/0x4d0 [ 939.415836] ? may_umount+0xb0/0xb0 [ 939.419452] ? _raw_read_unlock+0x22/0x30 [ 939.423586] ? __get_fs_type+0x97/0xc0 [ 939.427468] do_mount+0x564/0x3070 [ 939.431001] ? copy_mount_string+0x40/0x40 [ 939.435237] ? rcu_pm_notify+0xc0/0xc0 [ 939.439133] ? copy_mount_options+0x5f/0x380 [ 939.443529] ? rcu_read_lock_sched_held+0x108/0x120 [ 939.448534] ? kmem_cache_alloc_trace+0x616/0x780 [ 939.453372] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 939.458905] ? _copy_from_user+0xdf/0x150 [ 939.463048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 939.468571] ? copy_mount_options+0x285/0x380 [ 939.473066] ksys_mount+0x12d/0x140 [ 939.476686] __x64_sys_mount+0xbe/0x150 [ 939.480652] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 939.485661] do_syscall_64+0x1b1/0x800 [ 939.489539] ? finish_task_switch+0x1ca/0x840 [ 939.494034] ? syscall_return_slowpath+0x5c0/0x5c0 [ 939.498953] ? syscall_return_slowpath+0x30f/0x5c0 [ 939.503874] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 939.509230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 939.514085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.519261] RIP: 0033:0x455a09 2033/05/18 03:47:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}}) 2033/05/18 03:47:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 939.522445] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 939.530143] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 939.537397] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 939.544652] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 939.551908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 939.559163] R13: 00000000000004a5 R14: 00000000006fb018 R15: 000000000000000b [ 939.572749] device lo left promiscuous mode [ 939.585749] device lo left promiscuous mode [ 939.594693] device lo entered promiscuous mode [ 939.616506] device lo entered promiscuous mode [ 939.625174] device lo left promiscuous mode [ 939.633483] device lo left promiscuous mode 2033/05/18 03:47:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000000000fffffff500"}) 2033/05/18 03:47:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}) 2033/05/18 03:47:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f000000000000001f00"}) 2033/05/18 03:47:25 executing program 6 (fault-call:2 fault-nth:12): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:25 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454cd, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000006"}, 0x2c) 2033/05/18 03:47:25 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 939.733835] kernel msg: ebtables bug: please report to author: Wrong len argument [ 939.753183] device lo entered promiscuous mode [ 939.775388] device lo entered promiscuous mode [ 939.790124] FAULT_INJECTION: forcing a failure. [ 939.790124] name failslab, interval 1, probability 0, space 0, times 0 [ 939.801544] CPU: 0 PID: 21603 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 939.808844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.818218] Call Trace: [ 939.820835] dump_stack+0x1b9/0x294 [ 939.824496] ? dump_stack_print_info.cold.2+0x52/0x52 [ 939.829736] should_fail.cold.4+0xa/0x1a [ 939.833830] ? is_bpf_text_address+0xd7/0x170 [ 939.838364] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 939.843509] ? __save_stack_trace+0x7e/0xd0 [ 939.847866] ? graph_lock+0x170/0x170 [ 939.851710] ? find_held_lock+0x36/0x1c0 [ 939.855811] ? __lock_is_held+0xb5/0x140 [ 939.859922] ? check_same_owner+0x320/0x320 [ 939.864274] ? rcu_note_context_switch+0x710/0x710 [ 939.869239] __should_failslab+0x124/0x180 2033/05/18 03:47:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000048f00"}, 0x2c) 2033/05/18 03:47:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000008f0400"}, 0x2c) 2033/05/18 03:47:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000]}}) 2033/05/18 03:47:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 939.873938] should_failslab+0x9/0x14 [ 939.877768] kmem_cache_alloc_trace+0x2cb/0x780 [ 939.882467] ? __kmalloc_node+0x33/0x70 [ 939.886471] ? __kmalloc_node+0x33/0x70 [ 939.890488] ? rcu_read_lock_sched_held+0x108/0x120 [ 939.895540] __memcg_init_list_lru_node+0x17d/0x2c0 [ 939.899161] kernel msg: ebtables bug: please report to author: Wrong len argument [ 939.900577] ? kvfree_rcu+0x20/0x20 [ 939.900603] ? __kmalloc_node+0x47/0x70 [ 939.915833] __list_lru_init+0x456/0x790 [ 939.919930] ? list_lru_destroy+0x4c0/0x4c0 2033/05/18 03:47:26 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 939.924274] ? mark_held_locks+0xc9/0x160 [ 939.928455] ? __raw_spin_lock_init+0x1c/0x100 [ 939.933072] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 939.938111] ? __lockdep_init_map+0x105/0x590 [ 939.942634] ? lockdep_init_map+0x9/0x10 [ 939.946736] sget_userns+0x73a/0xf00 [ 939.950474] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 939.955176] ? kernfs_sop_show_options+0x190/0x190 [ 939.960129] ? destroy_unused_super.part.11+0x110/0x110 [ 939.965623] ? kasan_check_read+0x11/0x20 [ 939.969803] ? rcu_is_watching+0x85/0x140 [ 939.973982] ? rcu_pm_notify+0xc0/0xc0 [ 939.977910] ? rcu_read_lock_sched_held+0x108/0x120 [ 939.981512] kernel msg: ebtables bug: please report to author: Wrong len argument [ 939.982956] ? kmem_cache_alloc_trace+0x616/0x780 [ 939.982976] ? lock_downgrade+0x8e0/0x8e0 [ 939.983001] ? refcount_add_not_zero+0x320/0x320 [ 939.983031] kernfs_mount_ns+0x13d/0x8e0 [ 939.983056] ? kernfs_super_ns+0x70/0x70 [ 939.983095] sysfs_mount+0xdf/0x200 [ 939.983118] ? sysfs_kill_sb+0x40/0x40 [ 939.983142] ? alloc_pages_current+0x114/0x210 2033/05/18 03:47:26 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 939.998063] kernel msg: ebtables bug: please report to author: Wrong len argument [ 939.999748] ? security_sb_copy_data+0x88/0xb0 [ 939.999775] mount_fs+0xae/0x328 [ 939.999805] vfs_kern_mount.part.34+0xd4/0x4d0 [ 939.999829] ? may_umount+0xb0/0xb0 [ 939.999849] ? _raw_read_unlock+0x22/0x30 [ 939.999866] ? __get_fs_type+0x97/0xc0 [ 940.056600] do_mount+0x564/0x3070 [ 940.060174] ? copy_mount_string+0x40/0x40 [ 940.064436] ? rcu_pm_notify+0xc0/0xc0 [ 940.068364] ? copy_mount_options+0x5f/0x380 2033/05/18 03:47:26 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 940.072789] ? rcu_read_lock_sched_held+0x108/0x120 [ 940.076588] kernel msg: ebtables bug: please report to author: Wrong len argument [ 940.077826] ? kmem_cache_alloc_trace+0x616/0x780 [ 940.077855] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 940.077877] ? _copy_from_user+0xdf/0x150 [ 940.077905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 940.077925] ? copy_mount_options+0x285/0x380 [ 940.077953] ksys_mount+0x12d/0x140 [ 940.077981] __x64_sys_mount+0xbe/0x150 [ 940.088413] kernel msg: ebtables bug: please report to author: Wrong len argument [ 940.090461] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 940.090489] do_syscall_64+0x1b1/0x800 [ 940.090507] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 940.090530] ? syscall_return_slowpath+0x5c0/0x5c0 [ 940.090553] ? syscall_return_slowpath+0x30f/0x5c0 [ 940.090583] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 940.142568] kernel msg: ebtables bug: please report to author: Wrong len argument [ 940.144132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 940.144166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.144181] RIP: 0033:0x455a09 2033/05/18 03:47:26 executing program 6 (fault-call:2 fault-nth:13): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 940.144192] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 940.144213] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 940.144225] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 940.144236] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 940.144247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 940.144259] R13: 00000000000004a5 R14: 00000000006fb018 R15: 000000000000000c [ 940.228652] device lo left promiscuous mode [ 940.236418] kernel msg: ebtables bug: please report to author: Wrong len argument [ 940.239924] FAULT_INJECTION: forcing a failure. [ 940.239924] name failslab, interval 1, probability 0, space 0, times 0 [ 940.255593] CPU: 0 PID: 21633 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 940.262891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.272266] Call Trace: [ 940.274889] dump_stack+0x1b9/0x294 [ 940.278553] ? dump_stack_print_info.cold.2+0x52/0x52 [ 940.283793] should_fail.cold.4+0xa/0x1a [ 940.287891] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 940.293020] ? save_stack+0x43/0xd0 [ 940.296660] ? kmem_cache_alloc_trace+0x152/0x780 [ 940.301517] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 940.306709] ? __list_lru_init+0x456/0x790 [ 940.310938] ? sget_userns+0x73a/0xf00 [ 940.314825] ? graph_lock+0x170/0x170 [ 940.318622] ? do_mount+0x564/0x3070 [ 940.322429] ? ksys_mount+0x12d/0x140 [ 940.326241] ? __x64_sys_mount+0xbe/0x150 [ 940.330382] ? do_syscall_64+0x1b1/0x800 [ 940.334458] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.339834] ? find_held_lock+0x36/0x1c0 [ 940.343897] ? __lock_is_held+0xb5/0x140 [ 940.347972] ? check_same_owner+0x320/0x320 [ 940.352317] ? rcu_note_context_switch+0x710/0x710 [ 940.357277] __should_failslab+0x124/0x180 [ 940.361527] should_failslab+0x9/0x14 [ 940.365346] kmem_cache_alloc_trace+0x2cb/0x780 [ 940.370039] ? __kmalloc_node+0x33/0x70 [ 940.374026] ? __kmalloc_node+0x33/0x70 [ 940.378008] ? rcu_read_lock_sched_held+0x108/0x120 [ 940.383051] __memcg_init_list_lru_node+0x17d/0x2c0 [ 940.388074] ? kvfree_rcu+0x20/0x20 [ 940.391704] ? __kmalloc_node+0x47/0x70 [ 940.395677] __list_lru_init+0x456/0x790 [ 940.399735] ? list_lru_destroy+0x4c0/0x4c0 [ 940.404060] ? mark_held_locks+0xc9/0x160 [ 940.408226] ? __raw_spin_lock_init+0x1c/0x100 [ 940.412826] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 940.417857] ? __lockdep_init_map+0x105/0x590 [ 940.422359] ? lockdep_init_map+0x9/0x10 [ 940.426427] sget_userns+0x73a/0xf00 [ 940.430135] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 940.434800] ? kernfs_sop_show_options+0x190/0x190 [ 940.439724] ? destroy_unused_super.part.11+0x110/0x110 [ 940.445101] ? kasan_check_read+0x11/0x20 [ 940.449254] ? rcu_is_watching+0x85/0x140 [ 940.453411] ? rcu_pm_notify+0xc0/0xc0 [ 940.457311] ? rcu_read_lock_sched_held+0x108/0x120 [ 940.462336] ? kmem_cache_alloc_trace+0x616/0x780 [ 940.467190] ? lock_downgrade+0x8e0/0x8e0 [ 940.471336] ? refcount_add_not_zero+0x320/0x320 [ 940.476106] kernfs_mount_ns+0x13d/0x8e0 [ 940.480177] ? kernfs_super_ns+0x70/0x70 [ 940.484261] sysfs_mount+0xdf/0x200 [ 940.487902] ? sysfs_kill_sb+0x40/0x40 [ 940.491785] ? alloc_pages_current+0x114/0x210 [ 940.496372] ? security_sb_copy_data+0x88/0xb0 [ 940.500953] mount_fs+0xae/0x328 [ 940.504322] vfs_kern_mount.part.34+0xd4/0x4d0 [ 940.508909] ? may_umount+0xb0/0xb0 [ 940.512552] ? _raw_read_unlock+0x22/0x30 [ 940.516713] ? __get_fs_type+0x97/0xc0 [ 940.520616] do_mount+0x564/0x3070 [ 940.524169] ? copy_mount_string+0x40/0x40 [ 940.528406] ? rcu_pm_notify+0xc0/0xc0 [ 940.532325] ? copy_mount_options+0x5f/0x380 [ 940.536753] ? rcu_read_lock_sched_held+0x108/0x120 [ 940.541785] ? kmem_cache_alloc_trace+0x616/0x780 [ 940.546649] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 940.552212] ? _copy_from_user+0xdf/0x150 [ 940.556365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 940.561899] ? copy_mount_options+0x285/0x380 [ 940.566397] ksys_mount+0x12d/0x140 [ 940.570036] __x64_sys_mount+0xbe/0x150 [ 940.574019] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 940.579057] do_syscall_64+0x1b1/0x800 [ 940.582957] ? finish_task_switch+0x1ca/0x840 [ 940.587455] ? syscall_return_slowpath+0x5c0/0x5c0 [ 940.592381] ? syscall_return_slowpath+0x30f/0x5c0 [ 940.597312] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 940.602677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 940.607543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.612733] RIP: 0033:0x455a09 [ 940.615923] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 940.623642] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 940.630928] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 940.638204] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 940.645477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 940.652749] R13: 00000000000004a5 R14: 00000000006fb018 R15: 000000000000000d [ 940.662105] device lo left promiscuous mode [ 940.674543] device lo entered promiscuous mode [ 940.697293] device lo left promiscuous mode [ 940.716593] device lo entered promiscuous mode [ 940.728621] device lo left promiscuous mode 2033/05/18 03:47:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000600"}) 2033/05/18 03:47:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000fffffff500"}) 2033/05/18 03:47:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}}) 2033/05/18 03:47:26 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x5421, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:26 executing program 6 (fault-call:2 fault-nth:14): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 940.812385] device lo entered promiscuous mode [ 940.817947] kernel msg: ebtables bug: please report to author: Wrong len argument [ 940.821756] FAULT_INJECTION: forcing a failure. [ 940.821756] name failslab, interval 1, probability 0, space 0, times 0 [ 940.837012] CPU: 0 PID: 21657 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 940.844310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.853681] Call Trace: [ 940.856304] dump_stack+0x1b9/0x294 [ 940.859969] ? dump_stack_print_info.cold.2+0x52/0x52 [ 940.865207] should_fail.cold.4+0xa/0x1a [ 940.869307] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 940.870714] kernel msg: ebtables bug: please report to author: Wrong len argument [ 940.874433] ? save_stack+0x43/0xd0 [ 940.874455] ? kmem_cache_alloc_trace+0x152/0x780 [ 940.874476] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 940.895790] ? __list_lru_init+0x456/0x790 [ 940.900047] ? sget_userns+0x73a/0xf00 [ 940.903947] ? graph_lock+0x170/0x170 [ 940.907762] ? do_mount+0x564/0x3070 2033/05/18 03:47:26 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 940.911489] ? ksys_mount+0x12d/0x140 [ 940.915299] ? __x64_sys_mount+0xbe/0x150 [ 940.919464] ? do_syscall_64+0x1b1/0x800 [ 940.923545] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.928937] ? find_held_lock+0x36/0x1c0 [ 940.931537] kernel msg: ebtables bug: please report to author: Wrong len argument [ 940.933028] ? __lock_is_held+0xb5/0x140 [ 940.933075] ? check_same_owner+0x320/0x320 [ 940.933098] ? rcu_note_context_switch+0x710/0x710 [ 940.942806] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 940.944785] __should_failslab+0x124/0x180 [ 940.944810] should_failslab+0x9/0x14 [ 940.944835] kmem_cache_alloc_trace+0x2cb/0x780 [ 940.974421] ? __kmalloc_node+0x33/0x70 [ 940.978780] kernel msg: ebtables bug: please report to author: Wrong len argument [ 940.979281] ? __kmalloc_node+0x33/0x70 [ 940.979303] ? rcu_read_lock_sched_held+0x108/0x120 [ 940.979341] __memcg_init_list_lru_node+0x17d/0x2c0 [ 940.988785] kernel msg: ebtables bug: please report to author: Wrong len argument [ 940.990938] ? kvfree_rcu+0x20/0x20 2033/05/18 03:47:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 940.990962] ? __kmalloc_node+0x47/0x70 [ 940.990991] __list_lru_init+0x456/0x790 [ 941.020389] ? list_lru_destroy+0x4c0/0x4c0 [ 941.024744] ? mark_held_locks+0xc9/0x160 [ 941.026366] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.028920] ? __raw_spin_lock_init+0x1c/0x100 [ 941.028943] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 941.028964] ? __lockdep_init_map+0x105/0x590 [ 941.028987] ? lockdep_init_map+0x9/0x10 [ 941.029010] sget_userns+0x73a/0xf00 [ 941.038670] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.041215] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 941.041247] ? kernfs_sop_show_options+0x190/0x190 [ 941.041267] ? destroy_unused_super.part.11+0x110/0x110 [ 941.041298] ? kasan_check_read+0x11/0x20 [ 941.075926] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.081194] ? rcu_is_watching+0x85/0x140 [ 941.081215] ? rcu_pm_notify+0xc0/0xc0 [ 941.081259] ? rcu_read_lock_sched_held+0x108/0x120 [ 941.081278] ? kmem_cache_alloc_trace+0x616/0x780 2033/05/18 03:47:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 941.081298] ? lock_downgrade+0x8e0/0x8e0 [ 941.087922] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.093071] ? refcount_add_not_zero+0x320/0x320 [ 941.093103] kernfs_mount_ns+0x13d/0x8e0 [ 941.093124] ? kernfs_super_ns+0x70/0x70 [ 941.126557] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.127522] sysfs_mount+0xdf/0x200 [ 941.127546] ? sysfs_kill_sb+0x40/0x40 [ 941.127566] ? alloc_pages_current+0x114/0x210 [ 941.127586] ? security_sb_copy_data+0x88/0xb0 2033/05/18 03:47:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 941.133437] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.135713] mount_fs+0xae/0x328 [ 941.135742] vfs_kern_mount.part.34+0xd4/0x4d0 [ 941.135765] ? may_umount+0xb0/0xb0 [ 941.174254] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.175561] ? _raw_read_unlock+0x22/0x30 [ 941.175581] ? __get_fs_type+0x97/0xc0 [ 941.175612] do_mount+0x564/0x3070 [ 941.175638] ? copy_mount_string+0x40/0x40 [ 941.180929] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.187743] ? rcu_pm_notify+0xc0/0xc0 [ 941.187779] ? copy_mount_options+0x5f/0x380 [ 941.187797] ? rcu_read_lock_sched_held+0x108/0x120 [ 941.187814] ? kmem_cache_alloc_trace+0x616/0x780 [ 941.187837] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 941.234912] ? _copy_from_user+0xdf/0x150 [ 941.239094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.244654] ? copy_mount_options+0x285/0x380 [ 941.249182] ksys_mount+0x12d/0x140 [ 941.252839] __x64_sys_mount+0xbe/0x150 [ 941.256848] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 941.261892] do_syscall_64+0x1b1/0x800 [ 941.265780] ? finish_task_switch+0x1ca/0x840 [ 941.270269] ? syscall_return_slowpath+0x5c0/0x5c0 [ 941.275197] ? syscall_return_slowpath+0x30f/0x5c0 [ 941.280137] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 941.285498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 941.290340] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.295522] RIP: 0033:0x455a09 [ 941.298707] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 941.306436] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 941.313716] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 941.320987] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 941.328251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 941.335511] R13: 00000000000004a5 R14: 00000000006fb018 R15: 000000000000000e [ 941.352694] device lo left promiscuous mode [ 941.379678] device lo entered promiscuous mode [ 941.389237] device lo entered promiscuous mode [ 941.397521] device lo left promiscuous mode [ 941.412985] device lo left promiscuous mode [ 941.451113] device lo entered promiscuous mode [ 941.463639] device lo left promiscuous mode 2033/05/18 03:47:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000600"}) 2033/05/18 03:47:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000000600"}, 0x2c) 2033/05/18 03:47:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000000000300"}) 2033/05/18 03:47:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00]}}) 2033/05/18 03:47:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:27 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x5450, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:27 executing program 6 (fault-call:2 fault-nth:15): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000000048f"}, 0x2c) 2033/05/18 03:47:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 941.540751] device lo entered promiscuous mode [ 941.548363] FAULT_INJECTION: forcing a failure. [ 941.548363] name failslab, interval 1, probability 0, space 0, times 0 [ 941.549108] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.559727] CPU: 0 PID: 21713 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 941.574605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.579917] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.583969] Call Trace: [ 941.584000] dump_stack+0x1b9/0x294 [ 941.584029] ? dump_stack_print_info.cold.2+0x52/0x52 [ 941.584071] should_fail.cold.4+0xa/0x1a [ 941.607152] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 941.612283] ? save_stack+0x43/0xd0 [ 941.615934] ? kmem_cache_alloc_trace+0x152/0x780 [ 941.620798] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 941.626011] ? __list_lru_init+0x456/0x790 [ 941.630265] ? sget_userns+0x73a/0xf00 [ 941.634183] ? graph_lock+0x170/0x170 2033/05/18 03:47:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 941.638002] ? do_mount+0x564/0x3070 [ 941.641734] ? ksys_mount+0x12d/0x140 [ 941.645555] ? __x64_sys_mount+0xbe/0x150 [ 941.647981] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.649719] ? do_syscall_64+0x1b1/0x800 [ 941.649739] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.649768] ? find_held_lock+0x36/0x1c0 [ 941.649798] ? __lock_is_held+0xb5/0x140 [ 941.649842] ? check_same_owner+0x320/0x320 [ 941.649864] ? rcu_note_context_switch+0x710/0x710 [ 941.660244] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.661549] __should_failslab+0x124/0x180 [ 941.661574] should_failslab+0x9/0x14 [ 941.661594] kmem_cache_alloc_trace+0x2cb/0x780 [ 941.661612] ? __kmalloc_node+0x33/0x70 [ 941.661633] ? __kmalloc_node+0x33/0x70 [ 941.706147] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.709379] ? rcu_read_lock_sched_held+0x108/0x120 [ 941.709412] __memcg_init_list_lru_node+0x17d/0x2c0 [ 941.709437] ? kvfree_rcu+0x20/0x20 [ 941.709458] ? __kmalloc_node+0x47/0x70 2033/05/18 03:47:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 941.709489] __list_lru_init+0x456/0x790 [ 941.709511] ? list_lru_destroy+0x4c0/0x4c0 [ 941.716114] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.721100] ? mark_held_locks+0xc9/0x160 [ 941.721126] ? __raw_spin_lock_init+0x1c/0x100 [ 941.721150] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 941.721176] ? __lockdep_init_map+0x105/0x590 [ 941.721199] ? lockdep_init_map+0x9/0x10 [ 941.777108] sget_userns+0x73a/0xf00 [ 941.778276] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 941.780832] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 941.780860] ? kernfs_sop_show_options+0x190/0x190 [ 941.780883] ? destroy_unused_super.part.11+0x110/0x110 [ 941.780921] ? kasan_check_read+0x11/0x20 [ 941.780941] ? rcu_is_watching+0x85/0x140 [ 941.780965] ? rcu_pm_notify+0xc0/0xc0 [ 941.790874] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.793285] ? rcu_read_lock_sched_held+0x108/0x120 [ 941.793308] ? kmem_cache_alloc_trace+0x616/0x780 [ 941.793328] ? lock_downgrade+0x8e0/0x8e0 2033/05/18 03:47:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 941.793352] ? refcount_add_not_zero+0x320/0x320 [ 941.793377] kernfs_mount_ns+0x13d/0x8e0 [ 941.832264] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.833280] ? kernfs_super_ns+0x70/0x70 [ 941.833322] sysfs_mount+0xdf/0x200 [ 941.833344] ? sysfs_kill_sb+0x40/0x40 [ 941.833368] ? alloc_pages_current+0x114/0x210 [ 941.833389] ? security_sb_copy_data+0x88/0xb0 [ 941.833412] mount_fs+0xae/0x328 [ 941.839562] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.842319] vfs_kern_mount.part.34+0xd4/0x4d0 2033/05/18 03:47:28 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 941.842344] ? may_umount+0xb0/0xb0 [ 941.842366] ? _raw_read_unlock+0x22/0x30 [ 941.842383] ? __get_fs_type+0x97/0xc0 [ 941.842409] do_mount+0x564/0x3070 [ 941.879741] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.885772] ? do_raw_spin_unlock+0x9e/0x2e0 [ 941.885803] ? copy_mount_string+0x40/0x40 [ 941.885821] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 941.885844] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 941.885875] ? retint_kernel+0x10/0x10 [ 941.885912] ? copy_mount_options+0x1f0/0x380 [ 941.893459] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.894131] ? copy_mount_options+0x1f6/0x380 [ 941.894161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.894179] ? copy_mount_options+0x285/0x380 [ 941.894208] ksys_mount+0x12d/0x140 [ 941.894230] __x64_sys_mount+0xbe/0x150 [ 941.932180] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.935691] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 941.935719] do_syscall_64+0x1b1/0x800 [ 941.935738] ? finish_task_switch+0x1ca/0x840 2033/05/18 03:47:28 executing program 6 (fault-call:2 fault-nth:16): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 941.935759] ? syscall_return_slowpath+0x5c0/0x5c0 [ 941.935781] ? syscall_return_slowpath+0x30f/0x5c0 [ 941.935809] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 941.935833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 941.942592] kernel msg: ebtables bug: please report to author: Wrong len argument [ 941.947954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.947969] RIP: 0033:0x455a09 [ 941.947980] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 941.948000] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 941.948012] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 941.948022] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 941.948033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 941.948042] R13: 00000000000004a5 R14: 00000000006fb018 R15: 000000000000000f [ 942.049090] FAULT_INJECTION: forcing a failure. [ 942.049090] name failslab, interval 1, probability 0, space 0, times 0 [ 942.050462] device lo left promiscuous mode [ 942.057659] CPU: 0 PID: 21742 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 942.068641] device lo entered promiscuous mode [ 942.072188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.072196] Call Trace: [ 942.072224] dump_stack+0x1b9/0x294 [ 942.072251] ? dump_stack_print_info.cold.2+0x52/0x52 [ 942.120363] should_fail.cold.4+0xa/0x1a [ 942.124457] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 942.129586] ? save_stack+0x43/0xd0 [ 942.133231] ? kmem_cache_alloc_trace+0x152/0x780 [ 942.138089] ? __memcg_init_list_lru_node+0x17d/0x2c0 2033/05/18 03:47:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}}) [ 942.143299] ? __list_lru_init+0x456/0x790 [ 942.147552] ? sget_userns+0x73a/0xf00 [ 942.151463] ? graph_lock+0x170/0x170 [ 942.155277] ? do_mount+0x564/0x3070 [ 942.159009] ? ksys_mount+0x12d/0x140 [ 942.162824] ? __x64_sys_mount+0xbe/0x150 [ 942.166990] ? do_syscall_64+0x1b1/0x800 [ 942.171071] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.176461] ? find_held_lock+0x36/0x1c0 [ 942.180555] ? __lock_is_held+0xb5/0x140 [ 942.184657] ? check_same_owner+0x320/0x320 [ 942.189004] ? rcu_note_context_switch+0x710/0x710 [ 942.193962] __should_failslab+0x124/0x180 [ 942.198225] should_failslab+0x9/0x14 [ 942.202046] kmem_cache_alloc_trace+0x2cb/0x780 [ 942.206739] ? __kmalloc_node+0x33/0x70 [ 942.210734] ? __kmalloc_node+0x33/0x70 [ 942.214732] ? rcu_read_lock_sched_held+0x108/0x120 [ 942.219759] __memcg_init_list_lru_node+0x17d/0x2c0 [ 942.224772] ? kvfree_rcu+0x20/0x20 [ 942.228401] ? __kmalloc_node+0x47/0x70 [ 942.232376] __list_lru_init+0x456/0x790 [ 942.236444] ? list_lru_destroy+0x4c0/0x4c0 [ 942.240759] ? mark_held_locks+0xc9/0x160 [ 942.244904] ? __raw_spin_lock_init+0x1c/0x100 [ 942.249479] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 942.254488] ? __lockdep_init_map+0x105/0x590 [ 942.258976] ? lockdep_init_map+0x9/0x10 [ 942.263042] sget_userns+0x73a/0xf00 [ 942.266755] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 942.271432] ? kernfs_sop_show_options+0x190/0x190 [ 942.276363] ? destroy_unused_super.part.11+0x110/0x110 [ 942.281749] ? kasan_check_read+0x11/0x20 [ 942.285888] ? rcu_is_watching+0x85/0x140 [ 942.290040] ? rcu_pm_notify+0xc0/0xc0 [ 942.293942] ? rcu_read_lock_sched_held+0x108/0x120 [ 942.298965] ? kmem_cache_alloc_trace+0x616/0x780 [ 942.303811] ? lock_downgrade+0x8e0/0x8e0 [ 942.307953] ? refcount_add_not_zero+0x320/0x320 [ 942.312708] kernfs_mount_ns+0x13d/0x8e0 [ 942.316778] ? kernfs_super_ns+0x70/0x70 [ 942.320872] sysfs_mount+0xdf/0x200 [ 942.324518] ? sysfs_kill_sb+0x40/0x40 [ 942.328408] ? alloc_pages_current+0x114/0x210 [ 942.332986] ? security_sb_copy_data+0x88/0xb0 [ 942.337578] mount_fs+0xae/0x328 [ 942.340945] vfs_kern_mount.part.34+0xd4/0x4d0 [ 942.345523] ? may_umount+0xb0/0xb0 [ 942.349162] ? _raw_read_unlock+0x22/0x30 [ 942.353314] ? __get_fs_type+0x97/0xc0 [ 942.357198] do_mount+0x564/0x3070 [ 942.360747] ? copy_mount_string+0x40/0x40 [ 942.364985] ? rcu_pm_notify+0xc0/0xc0 [ 942.368873] ? copy_mount_options+0x5f/0x380 [ 942.373287] ? rcu_read_lock_sched_held+0x108/0x120 [ 942.378316] ? kmem_cache_alloc_trace+0x616/0x780 [ 942.383182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 942.388729] ? _copy_from_user+0xdf/0x150 [ 942.392874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.398422] ? copy_mount_options+0x285/0x380 [ 942.402925] ksys_mount+0x12d/0x140 [ 942.406565] __x64_sys_mount+0xbe/0x150 [ 942.410551] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 942.415584] do_syscall_64+0x1b1/0x800 [ 942.419476] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 942.424322] ? syscall_return_slowpath+0x5c0/0x5c0 [ 942.429267] ? syscall_return_slowpath+0x30f/0x5c0 [ 942.434200] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 942.439576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 942.444426] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.449604] RIP: 0033:0x455a09 [ 942.452789] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 942.460508] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 942.467767] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 942.475039] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 942.482321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 942.489608] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000010 [ 942.498856] device lo left promiscuous mode [ 942.521684] device lo entered promiscuous mode [ 942.528681] device lo left promiscuous mode [ 942.536468] device lo entered promiscuous mode [ 942.555294] device lo left promiscuous mode 2033/05/18 03:47:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) 2033/05/18 03:47:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000006"}, 0x2c) 2033/05/18 03:47:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454de, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000000ffffffff00"}) 2033/05/18 03:47:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}}) 2033/05/18 03:47:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000600"}, 0x2c) 2033/05/18 03:47:28 executing program 6 (fault-call:2 fault-nth:17): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:28 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000ffffffffffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 942.655691] kernel msg: ebtables bug: please report to author: Wrong len argument [ 942.656218] device lo entered promiscuous mode [ 942.676369] FAULT_INJECTION: forcing a failure. [ 942.676369] name failslab, interval 1, probability 0, space 0, times 0 [ 942.687909] CPU: 0 PID: 21774 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 942.695205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 2033/05/18 03:47:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 942.704570] Call Trace: [ 942.707179] dump_stack+0x1b9/0x294 [ 942.710845] ? dump_stack_print_info.cold.2+0x52/0x52 [ 942.716083] should_fail.cold.4+0xa/0x1a [ 942.720173] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 942.725300] ? save_stack+0x43/0xd0 [ 942.728952] ? kmem_cache_alloc_trace+0x152/0x780 [ 942.733819] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 942.739032] ? __list_lru_init+0x456/0x790 [ 942.743288] ? sget_userns+0x73a/0xf00 [ 942.747202] ? graph_lock+0x170/0x170 [ 942.751021] ? do_mount+0x564/0x3070 2033/05/18 03:47:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 942.754757] ? ksys_mount+0x12d/0x140 [ 942.758578] ? __x64_sys_mount+0xbe/0x150 [ 942.762745] ? do_syscall_64+0x1b1/0x800 [ 942.766827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.772223] ? find_held_lock+0x36/0x1c0 [ 942.776321] ? __lock_is_held+0xb5/0x140 [ 942.780428] ? check_same_owner+0x320/0x320 [ 942.784778] ? rcu_note_context_switch+0x710/0x710 [ 942.789745] __should_failslab+0x124/0x180 [ 942.794004] should_failslab+0x9/0x14 [ 942.797828] kmem_cache_alloc_trace+0x2cb/0x780 [ 942.802516] ? __kmalloc_node+0x33/0x70 2033/05/18 03:47:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000006"}, 0x2c) [ 942.806505] ? __kmalloc_node+0x33/0x70 [ 942.810503] ? rcu_read_lock_sched_held+0x108/0x120 [ 942.815551] __memcg_init_list_lru_node+0x17d/0x2c0 [ 942.820594] ? kvfree_rcu+0x20/0x20 [ 942.824244] ? __kmalloc_node+0x47/0x70 [ 942.828251] __list_lru_init+0x456/0x790 [ 942.832337] ? list_lru_destroy+0x4c0/0x4c0 [ 942.836679] ? mark_held_locks+0xc9/0x160 [ 942.840851] ? __raw_spin_lock_init+0x1c/0x100 [ 942.845460] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 942.850501] ? __lockdep_init_map+0x105/0x590 2033/05/18 03:47:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000048f00"}, 0x2c) 2033/05/18 03:47:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 942.855022] ? lockdep_init_map+0x9/0x10 [ 942.859114] sget_userns+0x73a/0xf00 [ 942.862846] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 942.867541] ? kernfs_sop_show_options+0x190/0x190 [ 942.872501] ? destroy_unused_super.part.11+0x110/0x110 [ 942.877905] ? kasan_check_read+0x11/0x20 [ 942.882079] ? rcu_is_watching+0x85/0x140 [ 942.886251] ? rcu_pm_notify+0xc0/0xc0 [ 942.890181] ? rcu_read_lock_sched_held+0x108/0x120 [ 942.895223] ? kmem_cache_alloc_trace+0x616/0x780 [ 942.900110] ? lock_downgrade+0x8e0/0x8e0 2033/05/18 03:47:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000600"}, 0x2c) [ 942.904289] ? refcount_add_not_zero+0x320/0x320 [ 942.909084] kernfs_mount_ns+0x13d/0x8e0 [ 942.913174] ? kernfs_super_ns+0x70/0x70 [ 942.917401] sysfs_mount+0xdf/0x200 [ 942.921054] ? sysfs_kill_sb+0x40/0x40 [ 942.924968] ? alloc_pages_current+0x114/0x210 [ 942.929574] ? security_sb_copy_data+0x88/0xb0 [ 942.934188] mount_fs+0xae/0x328 [ 942.937586] vfs_kern_mount.part.34+0xd4/0x4d0 [ 942.942365] ? may_umount+0xb0/0xb0 [ 942.946123] ? _raw_read_unlock+0x22/0x30 [ 942.950282] ? __get_fs_type+0x97/0xc0 [ 942.954198] do_mount+0x564/0x3070 [ 942.957770] ? copy_mount_string+0x40/0x40 [ 942.962024] ? rcu_pm_notify+0xc0/0xc0 [ 942.965953] ? copy_mount_options+0x5f/0x380 [ 942.970386] ? rcu_read_lock_sched_held+0x108/0x120 [ 942.975424] ? kmem_cache_alloc_trace+0x616/0x780 [ 942.980297] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 942.985855] ? _copy_from_user+0xdf/0x150 [ 942.990046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.995612] ? copy_mount_options+0x285/0x380 [ 943.000139] ksys_mount+0x12d/0x140 [ 943.003789] __x64_sys_mount+0xbe/0x150 [ 943.007779] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 943.012823] do_syscall_64+0x1b1/0x800 [ 943.016735] ? finish_task_switch+0x1ca/0x840 [ 943.021256] ? syscall_return_slowpath+0x5c0/0x5c0 [ 943.026214] ? syscall_return_slowpath+0x30f/0x5c0 [ 943.031170] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 943.034509] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.036554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 943.036589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.036604] RIP: 0033:0x455a09 [ 943.036614] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 943.065157] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 943.072442] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 943.079729] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 943.087009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 943.094301] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000011 [ 943.103887] device lo left promiscuous mode [ 943.123800] device lo entered promiscuous mode [ 943.135872] device lo entered promiscuous mode [ 943.142803] device lo left promiscuous mode [ 943.153238] device lo left promiscuous mode 2033/05/18 03:47:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000000100"}) 2033/05/18 03:47:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000008f0400"}, 0x2c) 2033/05/18 03:47:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}) 2033/05/18 03:47:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x8927, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:29 executing program 6 (fault-call:2 fault-nth:18): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) [ 943.163414] device lo entered promiscuous mode [ 943.171827] device lo left promiscuous mode [ 943.251225] device lo entered promiscuous mode [ 943.256737] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.258145] FAULT_INJECTION: forcing a failure. [ 943.258145] name failslab, interval 1, probability 0, space 0, times 0 [ 943.274408] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.275732] CPU: 0 PID: 21832 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 943.275750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 2033/05/18 03:47:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 943.300040] Call Trace: [ 943.302652] dump_stack+0x1b9/0x294 [ 943.306312] ? dump_stack_print_info.cold.2+0x52/0x52 [ 943.311547] should_fail.cold.4+0xa/0x1a [ 943.315638] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 943.320769] ? save_stack+0x43/0xd0 [ 943.324423] ? kmem_cache_alloc_trace+0x152/0x780 [ 943.329286] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 943.334574] ? __list_lru_init+0x456/0x790 [ 943.338826] ? sget_userns+0x73a/0xf00 [ 943.342734] ? graph_lock+0x170/0x170 [ 943.346553] ? do_mount+0x564/0x3070 2033/05/18 03:47:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 943.348215] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.350277] ? ksys_mount+0x12d/0x140 [ 943.350294] ? __x64_sys_mount+0xbe/0x150 [ 943.350313] ? do_syscall_64+0x1b1/0x800 [ 943.350331] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.350359] ? find_held_lock+0x36/0x1c0 [ 943.350388] ? __lock_is_held+0xb5/0x140 [ 943.350427] ? check_same_owner+0x320/0x320 [ 943.361172] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.361856] ? rcu_note_context_switch+0x710/0x710 2033/05/18 03:47:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 943.361886] __should_failslab+0x124/0x180 [ 943.361911] should_failslab+0x9/0x14 [ 943.361929] kmem_cache_alloc_trace+0x2cb/0x780 [ 943.361947] ? __kmalloc_node+0x33/0x70 [ 943.409395] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.413096] ? __kmalloc_node+0x33/0x70 [ 943.413119] ? rcu_read_lock_sched_held+0x108/0x120 [ 943.413150] __memcg_init_list_lru_node+0x17d/0x2c0 [ 943.413174] ? kvfree_rcu+0x20/0x20 [ 943.413194] ? __kmalloc_node+0x47/0x70 [ 943.413224] __list_lru_init+0x456/0x790 2033/05/18 03:47:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 943.413247] ? list_lru_destroy+0x4c0/0x4c0 [ 943.420133] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.424844] ? mark_held_locks+0xc9/0x160 [ 943.424872] ? __raw_spin_lock_init+0x1c/0x100 [ 943.424894] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 943.424914] ? __lockdep_init_map+0x105/0x590 [ 943.424939] ? lockdep_init_map+0x9/0x10 [ 943.464096] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.466669] sget_userns+0x73a/0xf00 [ 943.466689] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 943.466716] ? kernfs_sop_show_options+0x190/0x190 [ 943.466738] ? destroy_unused_super.part.11+0x110/0x110 [ 943.466775] ? kasan_check_read+0x11/0x20 [ 943.466796] ? rcu_is_watching+0x85/0x140 [ 943.473572] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.476395] ? rcu_pm_notify+0xc0/0xc0 [ 943.476441] ? rcu_read_lock_sched_held+0x108/0x120 [ 943.476462] ? kmem_cache_alloc_trace+0x616/0x780 [ 943.476479] ? lock_downgrade+0x8e0/0x8e0 [ 943.476503] ? refcount_add_not_zero+0x320/0x320 2033/05/18 03:47:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 943.515992] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.519595] kernfs_mount_ns+0x13d/0x8e0 [ 943.519622] ? kernfs_super_ns+0x70/0x70 [ 943.519662] sysfs_mount+0xdf/0x200 [ 943.519684] ? sysfs_kill_sb+0x40/0x40 [ 943.519705] ? alloc_pages_current+0x114/0x210 [ 943.519725] ? security_sb_copy_data+0x88/0xb0 [ 943.530211] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.531257] mount_fs+0xae/0x328 [ 943.531290] vfs_kern_mount.part.34+0xd4/0x4d0 [ 943.531315] ? may_umount+0xb0/0xb0 2033/05/18 03:47:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 943.531333] ? _raw_read_unlock+0x22/0x30 [ 943.531350] ? __get_fs_type+0x97/0xc0 [ 943.570405] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.573322] do_mount+0x564/0x3070 [ 943.573356] ? copy_mount_string+0x40/0x40 [ 943.573380] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 943.573410] ? retint_kernel+0x10/0x10 [ 943.573445] ? copy_mount_options+0x213/0x380 [ 943.580255] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.582616] ? __sanitizer_cov_trace_const_cmp4+0x11/0x20 2033/05/18 03:47:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 943.582641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 943.582661] ? copy_mount_options+0x285/0x380 [ 943.582689] ksys_mount+0x12d/0x140 [ 943.582711] __x64_sys_mount+0xbe/0x150 [ 943.624246] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.625357] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 943.625385] do_syscall_64+0x1b1/0x800 [ 943.625405] ? finish_task_switch+0x1ca/0x840 [ 943.625427] ? syscall_return_slowpath+0x5c0/0x5c0 [ 943.625450] ? syscall_return_slowpath+0x30f/0x5c0 2033/05/18 03:47:29 executing program 6 (fault-call:2 fault-nth:19): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 943.625475] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 943.625500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 943.632263] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.634147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.634163] RIP: 0033:0x455a09 [ 943.634173] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 943.634195] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 943.634206] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 943.634216] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 943.634230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 943.672585] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.677075] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000012 [ 943.758345] FAULT_INJECTION: forcing a failure. [ 943.758345] name failslab, interval 1, probability 0, space 0, times 0 [ 943.764959] device lo left promiscuous mode [ 943.772155] CPU: 0 PID: 21868 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 943.802197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.811565] Call Trace: [ 943.814177] dump_stack+0x1b9/0x294 [ 943.817836] ? dump_stack_print_info.cold.2+0x52/0x52 [ 943.823092] should_fail.cold.4+0xa/0x1a [ 943.827179] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 943.832305] ? save_stack+0x43/0xd0 [ 943.835949] ? kmem_cache_alloc_trace+0x152/0x780 [ 943.840815] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 943.846019] ? __list_lru_init+0x456/0x790 [ 943.850268] ? sget_userns+0x73a/0xf00 [ 943.854174] ? graph_lock+0x170/0x170 [ 943.857997] ? do_mount+0x564/0x3070 [ 943.861449] kernel msg: ebtables bug: please report to author: Wrong len argument [ 943.861721] ? ksys_mount+0x12d/0x140 [ 943.873135] ? __x64_sys_mount+0xbe/0x150 [ 943.877302] ? do_syscall_64+0x1b1/0x800 [ 943.881379] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.886772] ? find_held_lock+0x36/0x1c0 [ 943.890863] ? __lock_is_held+0xb5/0x140 [ 943.894963] ? check_same_owner+0x320/0x320 [ 943.899315] ? rcu_note_context_switch+0x710/0x710 [ 943.904278] __should_failslab+0x124/0x180 [ 943.908534] should_failslab+0x9/0x14 [ 943.912352] kmem_cache_alloc_trace+0x2cb/0x780 [ 943.917042] ? __kmalloc_node+0x33/0x70 [ 943.921027] ? __kmalloc_node+0x33/0x70 [ 943.925006] ? rcu_read_lock_sched_held+0x108/0x120 [ 943.930048] __memcg_init_list_lru_node+0x17d/0x2c0 [ 943.935068] ? kvfree_rcu+0x20/0x20 [ 943.938687] ? __kmalloc_node+0x47/0x70 [ 943.942657] __list_lru_init+0x456/0x790 [ 943.946711] ? list_lru_destroy+0x4c0/0x4c0 [ 943.951035] ? mark_held_locks+0xc9/0x160 [ 943.955179] ? __raw_spin_lock_init+0x1c/0x100 [ 943.959752] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 943.964758] ? __lockdep_init_map+0x105/0x590 [ 943.969244] ? lockdep_init_map+0x9/0x10 [ 943.973308] sget_userns+0x73a/0xf00 [ 943.977019] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 943.981691] ? kernfs_sop_show_options+0x190/0x190 [ 943.986614] ? destroy_unused_super.part.11+0x110/0x110 [ 943.991990] ? kasan_check_read+0x11/0x20 [ 943.996133] ? rcu_is_watching+0x85/0x140 [ 944.000275] ? rcu_pm_notify+0xc0/0xc0 [ 944.004161] ? rcu_read_lock_sched_held+0x108/0x120 [ 944.009182] ? kmem_cache_alloc_trace+0x616/0x780 [ 944.014023] ? lock_downgrade+0x8e0/0x8e0 [ 944.018193] ? refcount_add_not_zero+0x320/0x320 [ 944.022955] kernfs_mount_ns+0x13d/0x8e0 [ 944.027034] ? kernfs_super_ns+0x70/0x70 [ 944.031109] sysfs_mount+0xdf/0x200 [ 944.034734] ? sysfs_kill_sb+0x40/0x40 [ 944.038627] ? alloc_pages_current+0x114/0x210 [ 944.043198] ? security_sb_copy_data+0x88/0xb0 [ 944.047775] mount_fs+0xae/0x328 [ 944.051157] vfs_kern_mount.part.34+0xd4/0x4d0 [ 944.055732] ? may_umount+0xb0/0xb0 [ 944.059347] ? _raw_read_unlock+0x22/0x30 [ 944.063609] ? __get_fs_type+0x97/0xc0 [ 944.067491] do_mount+0x564/0x3070 [ 944.071047] ? copy_mount_string+0x40/0x40 [ 944.075277] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 944.080292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 944.085055] ? retint_kernel+0x10/0x10 [ 944.088944] ? copy_mount_options+0x1f0/0x380 [ 944.093434] ? copy_mount_options+0x1fa/0x380 [ 944.097920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 944.103447] ? copy_mount_options+0x285/0x380 [ 944.107938] ksys_mount+0x12d/0x140 [ 944.111591] __x64_sys_mount+0xbe/0x150 [ 944.115566] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 944.120578] do_syscall_64+0x1b1/0x800 [ 944.124458] ? finish_task_switch+0x1ca/0x840 [ 944.128959] ? syscall_return_slowpath+0x5c0/0x5c0 [ 944.133890] ? syscall_return_slowpath+0x30f/0x5c0 [ 944.138832] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 944.144218] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 944.149074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.154257] RIP: 0033:0x455a09 [ 944.157435] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 944.165143] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 944.172426] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 944.179689] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 944.186950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 944.194210] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000013 [ 944.213174] device lo entered promiscuous mode [ 944.222434] device lo left promiscuous mode [ 944.234338] device lo entered promiscuous mode [ 944.242112] device lo left promiscuous mode [ 944.252140] device lo entered promiscuous mode 2033/05/18 03:47:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00 \x00'}) 2033/05/18 03:47:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f00000000000000000000000600"}, 0x2c) 2033/05/18 03:47:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000]}}) 2033/05/18 03:47:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 944.269829] device lo left promiscuous mode 2033/05/18 03:47:30 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x4020940d, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:30 executing program 6 (fault-call:2 fault-nth:20): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00 \x00'}) [ 944.319532] device lo entered promiscuous mode [ 944.336137] kernel msg: ebtables bug: please report to author: Wrong len argument [ 944.343498] FAULT_INJECTION: forcing a failure. [ 944.343498] name failslab, interval 1, probability 0, space 0, times 0 [ 944.355170] CPU: 0 PID: 21885 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 944.362465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.365952] kernel msg: ebtables bug: please report to author: Wrong len argument [ 944.371832] Call Trace: [ 944.371862] dump_stack+0x1b9/0x294 [ 944.371889] ? dump_stack_print_info.cold.2+0x52/0x52 [ 944.371927] should_fail.cold.4+0xa/0x1a [ 944.371957] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 944.371980] ? save_stack+0x43/0xd0 [ 944.372001] ? kmem_cache_alloc_trace+0x152/0x780 [ 944.408634] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 944.413852] ? __list_lru_init+0x456/0x790 2033/05/18 03:47:30 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 944.418115] ? sget_userns+0x73a/0xf00 [ 944.422029] ? graph_lock+0x170/0x170 [ 944.425856] ? do_mount+0x564/0x3070 [ 944.426798] kernel msg: ebtables bug: please report to author: Wrong len argument [ 944.429579] ? ksys_mount+0x12d/0x140 [ 944.429598] ? __x64_sys_mount+0xbe/0x150 [ 944.429618] ? do_syscall_64+0x1b1/0x800 [ 944.429637] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.429666] ? find_held_lock+0x36/0x1c0 [ 944.429698] ? __lock_is_held+0xb5/0x140 [ 944.429745] ? check_same_owner+0x320/0x320 2033/05/18 03:47:30 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 944.429769] ? rcu_note_context_switch+0x710/0x710 [ 944.429793] __should_failslab+0x124/0x180 [ 944.440579] kernel msg: ebtables bug: please report to author: Wrong len argument [ 944.441213] should_failslab+0x9/0x14 [ 944.441235] kmem_cache_alloc_trace+0x2cb/0x780 [ 944.441252] ? __kmalloc_node+0x33/0x70 [ 944.441269] ? __kmalloc_node+0x33/0x70 [ 944.441290] ? rcu_read_lock_sched_held+0x108/0x120 [ 944.441317] __memcg_init_list_lru_node+0x17d/0x2c0 [ 944.441337] ? kvfree_rcu+0x20/0x20 2033/05/18 03:47:30 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 944.505666] kernel msg: ebtables bug: please report to author: Wrong len argument [ 944.510495] ? __kmalloc_node+0x47/0x70 [ 944.510529] __list_lru_init+0x456/0x790 [ 944.510555] ? list_lru_destroy+0x4c0/0x4c0 [ 944.510574] ? mark_held_locks+0xc9/0x160 [ 944.510600] ? __raw_spin_lock_init+0x1c/0x100 [ 944.510622] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 944.510643] ? __lockdep_init_map+0x105/0x590 [ 944.510665] ? lockdep_init_map+0x9/0x10 [ 944.510696] sget_userns+0x73a/0xf00 [ 944.517364] kernel msg: ebtables bug: please report to author: Wrong len argument [ 944.521946] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 944.521973] ? kernfs_sop_show_options+0x190/0x190 [ 944.521997] ? destroy_unused_super.part.11+0x110/0x110 [ 944.522035] ? kasan_check_read+0x11/0x20 [ 944.522054] ? rcu_is_watching+0x85/0x140 [ 944.522075] ? rcu_pm_notify+0xc0/0xc0 [ 944.522116] ? rcu_read_lock_sched_held+0x108/0x120 [ 944.586420] kernel msg: ebtables bug: please report to author: Wrong len argument [ 944.587130] ? kmem_cache_alloc_trace+0x616/0x780 [ 944.587149] ? lock_downgrade+0x8e0/0x8e0 2033/05/18 03:47:30 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 944.587176] ? refcount_add_not_zero+0x320/0x320 [ 944.587207] kernfs_mount_ns+0x13d/0x8e0 [ 944.587232] ? kernfs_super_ns+0x70/0x70 [ 944.587272] sysfs_mount+0xdf/0x200 [ 944.587294] ? sysfs_kill_sb+0x40/0x40 [ 944.587322] ? alloc_pages_current+0x114/0x210 [ 944.593856] kernel msg: ebtables bug: please report to author: Wrong len argument [ 944.595413] ? security_sb_copy_data+0x88/0xb0 [ 944.595442] mount_fs+0xae/0x328 [ 944.595471] vfs_kern_mount.part.34+0xd4/0x4d0 [ 944.595494] ? may_umount+0xb0/0xb0 [ 944.595515] ? _raw_read_unlock+0x22/0x30 2033/05/18 03:47:30 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 944.595532] ? __get_fs_type+0x97/0xc0 [ 944.595560] do_mount+0x564/0x3070 [ 944.638842] kernel msg: ebtables bug: please report to author: Wrong len argument [ 944.642106] ? copy_mount_string+0x40/0x40 [ 944.642126] ? rcu_pm_notify+0xc0/0xc0 [ 944.642161] ? copy_mount_options+0x5f/0x380 [ 944.642180] ? rcu_read_lock_sched_held+0x108/0x120 [ 944.642202] ? kmem_cache_alloc_trace+0x616/0x780 [ 944.642231] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 944.642251] ? _copy_from_user+0xdf/0x150 [ 944.642276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 944.642294] ? copy_mount_options+0x285/0x380 [ 944.653066] kernel msg: ebtables bug: please report to author: Wrong len argument [ 944.654511] ksys_mount+0x12d/0x140 [ 944.654537] __x64_sys_mount+0xbe/0x150 [ 944.654555] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 944.654582] do_syscall_64+0x1b1/0x800 [ 944.654603] ? finish_task_switch+0x1ca/0x840 [ 944.654622] ? syscall_return_slowpath+0x5c0/0x5c0 [ 944.654642] ? syscall_return_slowpath+0x30f/0x5c0 2033/05/18 03:47:30 executing program 6 (fault-call:2 fault-nth:21): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 944.720321] kernel msg: ebtables bug: please report to author: Wrong len argument [ 944.722930] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 944.722963] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 944.722994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.723009] RIP: 0033:0x455a09 [ 944.723020] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 944.723041] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 944.723053] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 944.723064] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 944.723074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 944.723085] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000014 [ 944.799278] FAULT_INJECTION: forcing a failure. [ 944.799278] name failslab, interval 1, probability 0, space 0, times 0 [ 944.802184] device lo left promiscuous mode [ 944.808493] CPU: 0 PID: 21917 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 944.838556] device lo entered promiscuous mode 2033/05/18 03:47:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}) 2033/05/18 03:47:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 944.848758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.848768] Call Trace: [ 944.848798] dump_stack+0x1b9/0x294 [ 944.848822] ? dump_stack_print_info.cold.2+0x52/0x52 [ 944.848861] should_fail.cold.4+0xa/0x1a [ 944.889849] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 944.894984] ? zap_class+0x720/0x720 [ 944.898723] ? print_usage_bug+0xc0/0xc0 [ 944.902814] ? graph_lock+0x170/0x170 [ 944.906638] ? lock_downgrade+0x8e0/0x8e0 [ 944.910831] ? find_held_lock+0x36/0x1c0 [ 944.914927] ? __lock_is_held+0xb5/0x140 [ 944.919036] ? check_same_owner+0x320/0x320 [ 944.923385] ? __might_sleep+0x95/0x190 [ 944.927386] ? rcu_note_context_switch+0x710/0x710 [ 944.932344] __should_failslab+0x124/0x180 [ 944.936608] should_failslab+0x9/0x14 [ 944.940436] __kmalloc+0x2c8/0x760 [ 944.944008] ? __kmalloc_node+0x47/0x70 [ 944.948000] ? __list_lru_init+0xdd/0x790 [ 944.952176] __list_lru_init+0xdd/0x790 [ 944.956176] ? list_lru_destroy+0x4c0/0x4c0 [ 944.960512] ? mark_held_locks+0xc9/0x160 [ 944.964690] ? __raw_spin_lock_init+0x1c/0x100 [ 944.969241] kernel msg: ebtables bug: please report to author: Wrong len argument [ 944.969292] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 944.981949] ? lockdep_init_map+0x9/0x10 [ 944.986043] sget_userns+0x767/0xf00 [ 944.989785] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 944.994489] ? kernfs_sop_show_options+0x190/0x190 [ 944.999450] ? destroy_unused_super.part.11+0x110/0x110 [ 945.004861] ? kasan_check_read+0x11/0x20 [ 945.009037] ? rcu_is_watching+0x85/0x140 [ 945.013216] ? rcu_pm_notify+0xc0/0xc0 [ 945.017150] ? rcu_read_lock_sched_held+0x108/0x120 [ 945.022194] ? kmem_cache_alloc_trace+0x616/0x780 [ 945.027065] ? lock_downgrade+0x8e0/0x8e0 [ 945.031251] ? refcount_add_not_zero+0x320/0x320 [ 945.036049] kernfs_mount_ns+0x13d/0x8e0 [ 945.040141] ? kernfs_super_ns+0x70/0x70 [ 945.044248] sysfs_mount+0xdf/0x200 [ 945.047910] ? sysfs_kill_sb+0x40/0x40 [ 945.051827] ? alloc_pages_current+0x114/0x210 [ 945.056443] ? security_sb_copy_data+0x88/0xb0 [ 945.061061] mount_fs+0xae/0x328 [ 945.064459] vfs_kern_mount.part.34+0xd4/0x4d0 [ 945.069072] ? may_umount+0xb0/0xb0 [ 945.072726] ? _raw_read_unlock+0x22/0x30 [ 945.076903] ? __get_fs_type+0x97/0xc0 [ 945.080807] do_mount+0x564/0x3070 [ 945.084349] ? copy_mount_string+0x40/0x40 [ 945.088588] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 945.093614] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 945.098370] ? retint_kernel+0x10/0x10 [ 945.102261] ? copy_mount_options+0x1f0/0x380 [ 945.106749] ? copy_mount_options+0x1f6/0x380 [ 945.111250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 945.116788] ? copy_mount_options+0x285/0x380 [ 945.121290] ksys_mount+0x12d/0x140 [ 945.124932] __x64_sys_mount+0xbe/0x150 [ 945.128914] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 945.133926] do_syscall_64+0x1b1/0x800 [ 945.137808] ? finish_task_switch+0x1ca/0x840 [ 945.142299] ? syscall_return_slowpath+0x5c0/0x5c0 [ 945.147221] ? syscall_return_slowpath+0x30f/0x5c0 [ 945.152149] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 945.157517] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 945.162361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.167550] RIP: 0033:0x455a09 [ 945.170728] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 945.178441] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 945.186369] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 945.193638] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 945.200911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 945.208183] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000015 [ 945.229683] device lo left promiscuous mode [ 945.236248] device lo entered promiscuous mode [ 945.246134] device lo left promiscuous mode [ 945.259725] device lo entered promiscuous mode [ 945.273463] device lo left promiscuous mode 2033/05/18 03:47:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000001f00"}) 2033/05/18 03:47:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000f00"}) 2033/05/18 03:47:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454dc, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000000008f"}, 0x2c) 2033/05/18 03:47:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:31 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:31 executing program 6 (fault-call:2 fault-nth:22): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 945.330063] device lo entered promiscuous mode [ 945.349413] kernel msg: ebtables bug: please report to author: Wrong len argument [ 945.361261] FAULT_INJECTION: forcing a failure. [ 945.361261] name failslab, interval 1, probability 0, space 0, times 0 [ 945.372675] CPU: 0 PID: 21940 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 945.379966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.389336] Call Trace: [ 945.391950] dump_stack+0x1b9/0x294 [ 945.395612] ? dump_stack_print_info.cold.2+0x52/0x52 [ 945.400851] should_fail.cold.4+0xa/0x1a [ 945.404946] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 945.410084] ? zap_class+0x720/0x720 [ 945.413731] kernel msg: ebtables bug: please report to author: Wrong len argument [ 945.413825] ? print_usage_bug+0xc0/0xc0 [ 945.425515] ? graph_lock+0x170/0x170 2033/05/18 03:47:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:31 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000000ffffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 945.429342] ? lock_downgrade+0x8e0/0x8e0 [ 945.433523] ? find_held_lock+0x36/0x1c0 [ 945.437620] ? __lock_is_held+0xb5/0x140 [ 945.441730] ? check_same_owner+0x320/0x320 [ 945.446076] ? __might_sleep+0x95/0x190 [ 945.450077] ? rcu_note_context_switch+0x710/0x710 [ 945.455045] __should_failslab+0x124/0x180 [ 945.459308] should_failslab+0x9/0x14 [ 945.463128] __kmalloc+0x2c8/0x760 [ 945.466693] ? __kmalloc_node+0x47/0x70 [ 945.470685] ? __list_lru_init+0xdd/0x790 [ 945.474866] __list_lru_init+0xdd/0x790 [ 945.478873] ? list_lru_destroy+0x4c0/0x4c0 [ 945.483217] ? mark_held_locks+0xc9/0x160 [ 945.487394] ? __raw_spin_lock_init+0x1c/0x100 [ 945.491998] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 945.497047] ? lockdep_init_map+0x9/0x10 [ 945.501137] sget_userns+0x767/0xf00 [ 945.504875] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 945.509576] ? kernfs_sop_show_options+0x190/0x190 [ 945.509830] kernel msg: ebtables bug: please report to author: Wrong len argument [ 945.514519] ? destroy_unused_super.part.11+0x110/0x110 2033/05/18 03:47:31 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 945.514557] ? kasan_check_read+0x11/0x20 [ 945.514576] ? rcu_is_watching+0x85/0x140 [ 945.514596] ? rcu_pm_notify+0xc0/0xc0 [ 945.514635] ? rcu_read_lock_sched_held+0x108/0x120 [ 945.514655] ? kmem_cache_alloc_trace+0x616/0x780 [ 945.514674] ? lock_downgrade+0x8e0/0x8e0 [ 945.514699] ? refcount_add_not_zero+0x320/0x320 [ 945.514730] kernfs_mount_ns+0x13d/0x8e0 [ 945.526114] kernel msg: ebtables bug: please report to author: Wrong len argument [ 945.527719] ? kernfs_super_ns+0x70/0x70 [ 945.527761] sysfs_mount+0xdf/0x200 2033/05/18 03:47:31 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 945.527783] ? sysfs_kill_sb+0x40/0x40 [ 945.527807] ? alloc_pages_current+0x114/0x210 [ 945.527834] ? security_sb_copy_data+0x88/0xb0 [ 945.527857] mount_fs+0xae/0x328 [ 945.577952] kernel msg: ebtables bug: please report to author: Wrong len argument [ 945.578104] vfs_kern_mount.part.34+0xd4/0x4d0 [ 945.578129] ? may_umount+0xb0/0xb0 [ 945.578151] ? _raw_read_unlock+0x22/0x30 [ 945.578168] ? __get_fs_type+0x97/0xc0 [ 945.578193] do_mount+0x564/0x3070 [ 945.584418] kernel msg: ebtables bug: please report to author: Wrong len argument [ 945.586664] ? copy_mount_string+0x40/0x40 [ 945.586684] ? rcu_pm_notify+0xc0/0xc0 [ 945.586719] ? copy_mount_options+0x5f/0x380 [ 945.586737] ? rcu_read_lock_sched_held+0x108/0x120 [ 945.586758] ? kmem_cache_alloc_trace+0x616/0x780 [ 945.586782] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 945.586803] ? _copy_from_user+0xdf/0x150 [ 945.648157] kernel msg: ebtables bug: please report to author: Wrong len argument [ 945.652171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 945.652192] ? copy_mount_options+0x285/0x380 2033/05/18 03:47:31 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 945.652221] ksys_mount+0x12d/0x140 [ 945.652247] __x64_sys_mount+0xbe/0x150 [ 945.652264] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 945.652289] do_syscall_64+0x1b1/0x800 [ 945.652307] ? finish_task_switch+0x1ca/0x840 [ 945.652328] ? syscall_return_slowpath+0x5c0/0x5c0 [ 945.652351] ? syscall_return_slowpath+0x30f/0x5c0 [ 945.660730] kernel msg: ebtables bug: please report to author: Wrong len argument [ 945.662040] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 945.662072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 945.662104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.662119] RIP: 0033:0x455a09 [ 945.662130] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 945.662149] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 945.662164] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 945.726332] kernel msg: ebtables bug: please report to author: Wrong len argument [ 945.728396] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 945.728409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2033/05/18 03:47:31 executing program 6 (fault-call:2 fault-nth:23): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 945.728421] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000016 [ 945.790777] device lo left promiscuous mode [ 945.806577] device lo entered promiscuous mode [ 945.819278] FAULT_INJECTION: forcing a failure. [ 945.819278] name failslab, interval 1, probability 0, space 0, times 0 2033/05/18 03:47:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) [ 945.830744] CPU: 0 PID: 21980 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 945.838039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.844540] kernel msg: ebtables bug: please report to author: Wrong len argument [ 945.847403] Call Trace: [ 945.847434] dump_stack+0x1b9/0x294 [ 945.847463] ? dump_stack_print_info.cold.2+0x52/0x52 [ 945.847504] should_fail.cold.4+0xa/0x1a [ 945.847524] ? is_bpf_text_address+0xd7/0x170 [ 945.875132] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 945.880294] ? __save_stack_trace+0x7e/0xd0 [ 945.884639] ? graph_lock+0x170/0x170 [ 945.888481] ? find_held_lock+0x36/0x1c0 [ 945.892578] ? __lock_is_held+0xb5/0x140 [ 945.896685] ? check_same_owner+0x320/0x320 [ 945.901039] ? rcu_note_context_switch+0x710/0x710 [ 945.906007] __should_failslab+0x124/0x180 [ 945.910278] should_failslab+0x9/0x14 [ 945.914106] kmem_cache_alloc_trace+0x2cb/0x780 [ 945.919145] ? __kmalloc_node+0x33/0x70 [ 945.923134] ? __kmalloc_node+0x33/0x70 [ 945.927110] ? rcu_read_lock_sched_held+0x108/0x120 [ 945.932125] __memcg_init_list_lru_node+0x17d/0x2c0 [ 945.937150] ? kvfree_rcu+0x20/0x20 [ 945.940779] ? __kmalloc_node+0x47/0x70 [ 945.944786] __list_lru_init+0x456/0x790 [ 945.948868] ? list_lru_destroy+0x4c0/0x4c0 [ 945.953202] ? mark_held_locks+0xc9/0x160 [ 945.957349] ? __raw_spin_lock_init+0x1c/0x100 [ 945.961945] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 945.966971] ? lockdep_init_map+0x9/0x10 [ 945.971050] sget_userns+0x767/0xf00 [ 945.974768] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 945.979437] ? kernfs_sop_show_options+0x190/0x190 [ 945.984361] ? destroy_unused_super.part.11+0x110/0x110 [ 945.989735] ? kasan_check_read+0x11/0x20 [ 945.993883] ? rcu_is_watching+0x85/0x140 [ 945.998035] ? rcu_pm_notify+0xc0/0xc0 [ 946.001940] ? rcu_read_lock_sched_held+0x108/0x120 [ 946.006982] ? kmem_cache_alloc_trace+0x616/0x780 [ 946.011835] ? lock_downgrade+0x8e0/0x8e0 [ 946.015994] ? refcount_add_not_zero+0x320/0x320 [ 946.020765] kernfs_mount_ns+0x13d/0x8e0 [ 946.024828] ? kernfs_super_ns+0x70/0x70 [ 946.028913] sysfs_mount+0xdf/0x200 [ 946.032551] ? sysfs_kill_sb+0x40/0x40 [ 946.036447] ? alloc_pages_current+0x114/0x210 [ 946.041044] ? security_sb_copy_data+0x88/0xb0 [ 946.045643] mount_fs+0xae/0x328 [ 946.049024] vfs_kern_mount.part.34+0xd4/0x4d0 [ 946.053613] ? may_umount+0xb0/0xb0 [ 946.057256] ? _raw_read_unlock+0x22/0x30 [ 946.061409] ? __get_fs_type+0x97/0xc0 [ 946.065296] do_mount+0x564/0x3070 [ 946.068852] ? copy_mount_string+0x40/0x40 [ 946.073100] ? rcu_pm_notify+0xc0/0xc0 [ 946.077010] ? copy_mount_options+0x5f/0x380 [ 946.081422] ? rcu_read_lock_sched_held+0x108/0x120 [ 946.086454] ? kmem_cache_alloc_trace+0x616/0x780 [ 946.091302] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 946.096845] ? _copy_from_user+0xdf/0x150 [ 946.101001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 946.106542] ? copy_mount_options+0x285/0x380 [ 946.111067] ksys_mount+0x12d/0x140 [ 946.114697] __x64_sys_mount+0xbe/0x150 [ 946.118666] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 946.123696] do_syscall_64+0x1b1/0x800 [ 946.127579] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 946.132425] ? syscall_return_slowpath+0x5c0/0x5c0 [ 946.137375] ? syscall_return_slowpath+0x30f/0x5c0 [ 946.142321] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 946.147706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 946.152558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.157750] RIP: 0033:0x455a09 [ 946.160948] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 946.168678] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 946.175943] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 946.183211] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 946.190486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 946.197753] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000017 [ 946.207141] device lo left promiscuous mode [ 946.223216] device lo entered promiscuous mode [ 946.239700] device lo left promiscuous mode [ 946.249876] device lo entered promiscuous mode [ 946.274684] device lo left promiscuous mode 2033/05/18 03:47:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000000300"}) 2033/05/18 03:47:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x800454d7, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00@\x00'}) 2033/05/18 03:47:32 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:32 executing program 6 (fault-call:2 fault-nth:24): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000004"}, 0x2c) 2033/05/18 03:47:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000004"}, 0x2c) [ 946.363607] device lo entered promiscuous mode [ 946.384641] kernel msg: ebtables bug: please report to author: Wrong len argument [ 946.387572] FAULT_INJECTION: forcing a failure. [ 946.387572] name failslab, interval 1, probability 0, space 0, times 0 [ 946.403805] CPU: 0 PID: 22011 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 946.410545] kernel msg: ebtables bug: please report to author: Wrong len argument [ 946.411093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.411103] Call Trace: [ 946.411130] dump_stack+0x1b9/0x294 [ 946.411154] ? dump_stack_print_info.cold.2+0x52/0x52 [ 946.439556] should_fail.cold.4+0xa/0x1a [ 946.443656] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 946.448792] ? zap_class+0x720/0x720 [ 946.452533] ? print_usage_bug+0xc0/0xc0 [ 946.456617] ? graph_lock+0x170/0x170 [ 946.460434] ? lock_downgrade+0x8e0/0x8e0 [ 946.464612] ? find_held_lock+0x36/0x1c0 [ 946.468702] ? __lock_is_held+0xb5/0x140 [ 946.472817] ? check_same_owner+0x320/0x320 [ 946.477164] ? __might_sleep+0x95/0x190 [ 946.479445] kernel msg: ebtables bug: please report to author: Wrong len argument [ 946.481154] ? rcu_note_context_switch+0x710/0x710 [ 946.481185] __should_failslab+0x124/0x180 [ 946.481210] should_failslab+0x9/0x14 [ 946.481229] __kmalloc+0x2c8/0x760 [ 946.481255] ? __kmalloc_node+0x47/0x70 [ 946.481274] ? __list_lru_init+0xdd/0x790 [ 946.481300] __list_lru_init+0xdd/0x790 [ 946.481324] ? list_lru_destroy+0x4c0/0x4c0 [ 946.506060] kernel msg: ebtables bug: please report to author: Wrong len argument [ 946.509394] ? mark_held_locks+0xc9/0x160 [ 946.509421] ? __raw_spin_lock_init+0x1c/0x100 [ 946.509444] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 946.509474] ? lockdep_init_map+0x9/0x10 [ 946.509500] sget_userns+0x767/0xf00 [ 946.509515] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 946.509538] ? kernfs_sop_show_options+0x190/0x190 [ 946.560690] ? destroy_unused_super.part.11+0x110/0x110 [ 946.566098] ? kasan_check_read+0x11/0x20 [ 946.569968] kernel msg: ebtables bug: please report to author: Wrong len argument [ 946.572436] ? rcu_is_watching+0x85/0x140 [ 946.572457] ? rcu_pm_notify+0xc0/0xc0 [ 946.572496] ? rcu_read_lock_sched_held+0x108/0x120 [ 946.572518] ? kmem_cache_alloc_trace+0x616/0x780 [ 946.572537] ? lock_downgrade+0x8e0/0x8e0 [ 946.572564] ? refcount_add_not_zero+0x320/0x320 [ 946.572592] kernfs_mount_ns+0x13d/0x8e0 [ 946.572614] ? kernfs_super_ns+0x70/0x70 [ 946.582779] kernel msg: ebtables bug: please report to author: Wrong len argument [ 946.584431] sysfs_mount+0xdf/0x200 [ 946.584454] ? sysfs_kill_sb+0x40/0x40 [ 946.584478] ? alloc_pages_current+0x114/0x210 [ 946.584500] ? security_sb_copy_data+0x88/0xb0 [ 946.584523] mount_fs+0xae/0x328 [ 946.584549] vfs_kern_mount.part.34+0xd4/0x4d0 [ 946.643338] kernel msg: ebtables bug: please report to author: Wrong len argument [ 946.647488] ? may_umount+0xb0/0xb0 [ 946.647511] ? _raw_read_unlock+0x22/0x30 [ 946.647528] ? __get_fs_type+0x97/0xc0 [ 946.647559] do_mount+0x564/0x3070 [ 946.647580] ? do_raw_spin_unlock+0x9e/0x2e0 [ 946.647607] ? copy_mount_string+0x40/0x40 [ 946.647624] ? rcu_pm_notify+0xc0/0xc0 [ 946.647663] ? copy_mount_options+0x5f/0x380 [ 946.658308] kernel msg: ebtables bug: please report to author: Wrong len argument [ 946.658928] ? rcu_read_lock_sched_held+0x108/0x120 [ 946.658948] ? kmem_cache_alloc_trace+0x616/0x780 [ 946.658972] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 946.710531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 946.716095] ? copy_mount_options+0x285/0x380 [ 946.717726] kernel msg: ebtables bug: please report to author: Wrong len argument [ 946.720617] ksys_mount+0x12d/0x140 [ 946.720644] __x64_sys_mount+0xbe/0x150 2033/05/18 03:47:32 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:32 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:32 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:32 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 946.720663] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 946.720689] do_syscall_64+0x1b1/0x800 [ 946.720707] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 946.720733] ? syscall_return_slowpath+0x5c0/0x5c0 [ 946.720754] ? syscall_return_slowpath+0x30f/0x5c0 [ 946.720779] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 946.720805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 946.720831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.732598] kernel msg: ebtables bug: please report to author: Wrong len argument [ 946.736036] RIP: 0033:0x455a09 2033/05/18 03:47:32 executing program 6 (fault-call:2 fault-nth:25): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x1000000}, 0x2c) 2033/05/18 03:47:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) [ 946.736048] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 946.736069] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 946.736081] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 946.736092] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 946.736104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 946.736115] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000018 [ 946.843167] device lo left promiscuous mode [ 946.845722] FAULT_INJECTION: forcing a failure. [ 946.845722] name failslab, interval 1, probability 0, space 0, times 0 [ 946.859066] CPU: 0 PID: 22041 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 946.866363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.875743] Call Trace: [ 946.878361] dump_stack+0x1b9/0x294 [ 946.880229] device lo entered promiscuous mode [ 946.882017] ? dump_stack_print_info.cold.2+0x52/0x52 [ 946.882056] should_fail.cold.4+0xa/0x1a [ 946.882079] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 946.901010] ? save_stack+0x43/0xd0 [ 946.904661] ? kmem_cache_alloc_trace+0x152/0x780 [ 946.909534] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 946.914748] ? __list_lru_init+0x456/0x790 [ 946.919006] ? sget_userns+0x767/0xf00 [ 946.922919] ? graph_lock+0x170/0x170 [ 946.926749] ? do_mount+0x564/0x3070 [ 946.930486] ? ksys_mount+0x12d/0x140 [ 946.934313] ? __x64_sys_mount+0xbe/0x150 [ 946.938572] ? do_syscall_64+0x1b1/0x800 [ 946.942659] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.948060] ? find_held_lock+0x36/0x1c0 [ 946.952170] ? __lock_is_held+0xb5/0x140 [ 946.956255] ? rvt_driver_qp_init+0xc70/0xde0 [ 946.960798] ? check_same_owner+0x320/0x320 [ 946.965162] ? rcu_note_context_switch+0x710/0x710 [ 946.970125] __should_failslab+0x124/0x180 [ 946.971554] kernel msg: ebtables bug: please report to author: Wrong len argument [ 946.974384] should_failslab+0x9/0x14 [ 946.974405] kmem_cache_alloc_trace+0x2cb/0x780 2033/05/18 03:47:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 946.974421] ? __kmalloc_node+0x33/0x70 [ 946.974439] ? __kmalloc_node+0x33/0x70 [ 946.974460] ? rcu_read_lock_sched_held+0x108/0x120 [ 946.974491] __memcg_init_list_lru_node+0x17d/0x2c0 [ 946.974513] ? kvfree_rcu+0x20/0x20 [ 946.974531] ? __kmalloc_node+0x47/0x70 [ 946.974557] __list_lru_init+0x456/0x790 [ 947.007376] kernel msg: ebtables bug: please report to author: Wrong len argument [ 947.008590] ? list_lru_destroy+0x4c0/0x4c0 [ 947.008612] ? mark_held_locks+0xc9/0x160 [ 947.008638] ? __raw_spin_lock_init+0x1c/0x100 [ 947.008659] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 947.008683] ? lockdep_init_map+0x9/0x10 [ 947.050072] sget_userns+0x767/0xf00 [ 947.053813] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 947.058517] ? kernfs_sop_show_options+0x190/0x190 [ 947.063475] ? destroy_unused_super.part.11+0x110/0x110 [ 947.068872] ? kasan_check_read+0x11/0x20 [ 947.073025] ? rcu_is_watching+0x85/0x140 [ 947.077182] ? rcu_pm_notify+0xc0/0xc0 [ 947.081092] ? rcu_read_lock_sched_held+0x108/0x120 [ 947.086113] ? kmem_cache_alloc_trace+0x616/0x780 [ 947.090967] ? lock_downgrade+0x8e0/0x8e0 [ 947.095122] ? refcount_add_not_zero+0x320/0x320 [ 947.099890] kernfs_mount_ns+0x13d/0x8e0 [ 947.103963] ? kernfs_super_ns+0x70/0x70 [ 947.108052] sysfs_mount+0xdf/0x200 [ 947.111719] ? sysfs_kill_sb+0x40/0x40 [ 947.115618] ? alloc_pages_current+0x114/0x210 [ 947.120197] ? security_sb_copy_data+0x88/0xb0 [ 947.124788] mount_fs+0xae/0x328 [ 947.128167] vfs_kern_mount.part.34+0xd4/0x4d0 [ 947.132747] ? may_umount+0xb0/0xb0 [ 947.136370] ? _raw_read_unlock+0x22/0x30 [ 947.140525] ? __get_fs_type+0x97/0xc0 [ 947.144423] do_mount+0x564/0x3070 [ 947.147973] ? copy_mount_string+0x40/0x40 [ 947.152214] ? rcu_pm_notify+0xc0/0xc0 [ 947.156104] ? copy_mount_options+0x5f/0x380 [ 947.160525] ? rcu_read_lock_sched_held+0x108/0x120 [ 947.165546] ? kmem_cache_alloc_trace+0x616/0x780 [ 947.170395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 947.175925] ? copy_mount_options+0x285/0x380 [ 947.180416] ksys_mount+0x12d/0x140 [ 947.184761] __x64_sys_mount+0xbe/0x150 [ 947.188738] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 947.193786] do_syscall_64+0x1b1/0x800 [ 947.197683] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 947.202521] ? syscall_return_slowpath+0x5c0/0x5c0 [ 947.207460] ? syscall_return_slowpath+0x30f/0x5c0 [ 947.212395] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 947.217755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 947.222617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.227896] RIP: 0033:0x455a09 [ 947.231083] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 947.238885] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 947.246144] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 947.253414] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 947.260691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 947.267953] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000019 [ 947.277346] device lo left promiscuous mode [ 947.286780] device lo entered promiscuous mode [ 947.337642] device lo left promiscuous mode 2033/05/18 03:47:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000001800"}) 2033/05/18 03:47:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x800454d3, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:33 executing program 6 (fault-call:2 fault-nth:26): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x6000000}, 0x2c) 2033/05/18 03:47:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000500"}) 2033/05/18 03:47:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 947.369486] device lo entered promiscuous mode [ 947.376937] device lo left promiscuous mode [ 947.428925] device lo entered promiscuous mode [ 947.440818] kernel msg: ebtables bug: please report to author: Wrong len argument [ 947.444778] FAULT_INJECTION: forcing a failure. [ 947.444778] name failslab, interval 1, probability 0, space 0, times 0 [ 947.459921] CPU: 0 PID: 22069 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 947.467222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.476593] Call Trace: 2033/05/18 03:47:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 947.479209] dump_stack+0x1b9/0x294 [ 947.482875] ? dump_stack_print_info.cold.2+0x52/0x52 [ 947.482902] kernel msg: ebtables bug: please report to author: Wrong len argument [ 947.488097] should_fail.cold.4+0xa/0x1a [ 947.488127] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 947.488150] ? save_stack+0x43/0xd0 [ 947.488164] ? kmem_cache_alloc_trace+0x152/0x780 [ 947.488183] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 947.518645] ? __list_lru_init+0x456/0x790 [ 947.522908] ? sget_userns+0x767/0xf00 2033/05/18 03:47:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x8f040000}, 0x2c) 2033/05/18 03:47:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 947.526818] ? graph_lock+0x170/0x170 [ 947.530639] ? do_mount+0x564/0x3070 [ 947.534385] ? ksys_mount+0x12d/0x140 [ 947.538205] ? __x64_sys_mount+0xbe/0x150 [ 947.542371] ? do_syscall_64+0x1b1/0x800 [ 947.546450] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.551847] ? find_held_lock+0x36/0x1c0 [ 947.555943] ? __lock_is_held+0xb5/0x140 [ 947.560147] ? check_same_owner+0x320/0x320 [ 947.564495] ? rcu_note_context_switch+0x710/0x710 [ 947.569460] __should_failslab+0x124/0x180 [ 947.573726] should_failslab+0x9/0x14 2033/05/18 03:47:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x8f04000000000000}, 0x2c) [ 947.577553] kmem_cache_alloc_trace+0x2cb/0x780 [ 947.582247] ? __kmalloc_node+0x33/0x70 [ 947.586252] ? __kmalloc_node+0x33/0x70 [ 947.590256] ? rcu_read_lock_sched_held+0x108/0x120 [ 947.595309] __memcg_init_list_lru_node+0x17d/0x2c0 [ 947.600361] ? kvfree_rcu+0x20/0x20 [ 947.602766] kernel msg: ebtables bug: please report to author: Wrong len argument [ 947.604020] ? __kmalloc_node+0x47/0x70 [ 947.604053] __list_lru_init+0x456/0x790 [ 947.604083] ? list_lru_destroy+0x4c0/0x4c0 [ 947.604112] ? mark_held_locks+0xc9/0x160 2033/05/18 03:47:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x100000000000000}, 0x2c) 2033/05/18 03:47:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 947.604138] ? __raw_spin_lock_init+0x1c/0x100 [ 947.604163] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 947.604196] ? lockdep_init_map+0x9/0x10 [ 947.623043] kernel msg: ebtables bug: please report to author: Wrong len argument [ 947.624167] sget_userns+0x767/0xf00 [ 947.624186] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 947.624213] ? kernfs_sop_show_options+0x190/0x190 [ 947.624234] ? destroy_unused_super.part.11+0x110/0x110 [ 947.624266] ? kasan_check_read+0x11/0x20 [ 947.672452] ? rcu_is_watching+0x85/0x140 2033/05/18 03:47:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x600000000000000}, 0x2c) [ 947.676620] ? rcu_pm_notify+0xc0/0xc0 [ 947.680560] ? rcu_read_lock_sched_held+0x108/0x120 [ 947.685602] ? kmem_cache_alloc_trace+0x616/0x780 [ 947.690473] ? lock_downgrade+0x8e0/0x8e0 [ 947.694672] ? refcount_add_not_zero+0x320/0x320 [ 947.699462] kernfs_mount_ns+0x13d/0x8e0 [ 947.703548] ? kernfs_super_ns+0x70/0x70 [ 947.707656] sysfs_mount+0xdf/0x200 [ 947.711311] ? sysfs_kill_sb+0x40/0x40 [ 947.715224] ? alloc_pages_current+0x114/0x210 [ 947.716639] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x600}, 0x2c) [ 947.719827] ? security_sb_copy_data+0x88/0xb0 [ 947.719853] mount_fs+0xae/0x328 [ 947.719884] vfs_kern_mount.part.34+0xd4/0x4d0 [ 947.719908] ? may_umount+0xb0/0xb0 [ 947.719929] ? _raw_read_unlock+0x22/0x30 [ 947.719950] ? __get_fs_type+0x97/0xc0 [ 947.751744] do_mount+0x564/0x3070 [ 947.752722] kernel msg: ebtables bug: please report to author: Wrong len argument [ 947.755310] ? copy_mount_string+0x40/0x40 [ 947.755330] ? rcu_pm_notify+0xc0/0xc0 [ 947.755365] ? copy_mount_options+0x5f/0x380 [ 947.755381] ? rcu_read_lock_sched_held+0x108/0x120 [ 947.755402] ? kmem_cache_alloc_trace+0x616/0x780 [ 947.785536] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 947.791105] ? _copy_from_user+0xdf/0x150 [ 947.795295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 947.800856] ? copy_mount_options+0x285/0x380 [ 947.805384] ksys_mount+0x12d/0x140 [ 947.809038] __x64_sys_mount+0xbe/0x150 [ 947.813032] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 947.818083] do_syscall_64+0x1b1/0x800 [ 947.821992] ? finish_task_switch+0x1ca/0x840 [ 947.826514] ? syscall_return_slowpath+0x5c0/0x5c0 [ 947.831471] ? syscall_return_slowpath+0x30f/0x5c0 [ 947.836435] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 947.841836] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 947.846719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.851926] RIP: 0033:0x455a09 [ 947.855134] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 947.862886] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 947.870164] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 947.877435] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 947.884710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 947.891980] R13: 00000000000004a5 R14: 00000000006fb018 R15: 000000000000001a [ 947.901092] device lo left promiscuous mode [ 947.916991] device lo entered promiscuous mode [ 947.935192] device lo left promiscuous mode [ 947.946801] device lo entered promiscuous mode [ 947.964665] device lo entered promiscuous mode [ 947.983439] device lo left promiscuous mode 2033/05/18 03:47:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000000001600"}) 2033/05/18 03:47:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}) 2033/05/18 03:47:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454c8, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x48f}, 0x2c) 2033/05/18 03:47:34 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000500", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:34 executing program 6 (fault-call:2 fault-nth:27): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 948.062696] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.072383] FAULT_INJECTION: forcing a failure. [ 948.072383] name failslab, interval 1, probability 0, space 0, times 0 [ 948.083773] CPU: 0 PID: 22128 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 948.091064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.096653] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.100421] Call Trace: 2033/05/18 03:47:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x6}, 0x2c) 2033/05/18 03:47:34 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 948.100453] dump_stack+0x1b9/0x294 [ 948.100487] ? dump_stack_print_info.cold.2+0x52/0x52 [ 948.119563] should_fail.cold.4+0xa/0x1a [ 948.123667] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 948.128806] ? save_stack+0x43/0xd0 [ 948.132460] ? kmem_cache_alloc_trace+0x152/0x780 [ 948.137321] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 948.142529] ? __list_lru_init+0x456/0x790 [ 948.146782] ? sget_userns+0x767/0xf00 [ 948.150695] ? graph_lock+0x170/0x170 [ 948.154515] ? do_mount+0x564/0x3070 [ 948.158248] ? ksys_mount+0x12d/0x140 [ 948.162070] ? __x64_sys_mount+0xbe/0x150 [ 948.166333] ? do_syscall_64+0x1b1/0x800 [ 948.170414] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.175808] ? find_held_lock+0x36/0x1c0 [ 948.176284] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.179894] ? __lock_is_held+0xb5/0x140 [ 948.179940] ? check_same_owner+0x320/0x320 [ 948.179965] ? rcu_note_context_switch+0x710/0x710 [ 948.179994] __should_failslab+0x124/0x180 [ 948.180018] should_failslab+0x9/0x14 2033/05/18 03:47:34 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 948.180036] kmem_cache_alloc_trace+0x2cb/0x780 [ 948.180056] ? __kmalloc_node+0x33/0x70 [ 948.191004] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.191738] ? __kmalloc_node+0x33/0x70 [ 948.191761] ? rcu_read_lock_sched_held+0x108/0x120 [ 948.191792] __memcg_init_list_lru_node+0x17d/0x2c0 [ 948.191815] ? kvfree_rcu+0x20/0x20 [ 948.191833] ? __kmalloc_node+0x47/0x70 [ 948.246925] __list_lru_init+0x456/0x790 [ 948.251011] ? list_lru_destroy+0x4c0/0x4c0 [ 948.251426] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:34 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000007fffffff00", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 948.255346] ? mark_held_locks+0xc9/0x160 [ 948.255372] ? __raw_spin_lock_init+0x1c/0x100 [ 948.255395] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 948.255425] ? lockdep_init_map+0x9/0x10 [ 948.255452] sget_userns+0x767/0xf00 [ 948.255469] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 948.255496] ? kernfs_sop_show_options+0x190/0x190 [ 948.255519] ? destroy_unused_super.part.11+0x110/0x110 [ 948.265766] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.267300] ? kasan_check_read+0x11/0x20 2033/05/18 03:47:34 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 948.267320] ? rcu_is_watching+0x85/0x140 [ 948.267341] ? rcu_pm_notify+0xc0/0xc0 [ 948.267379] ? rcu_read_lock_sched_held+0x108/0x120 [ 948.310274] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.311541] ? kmem_cache_alloc_trace+0x616/0x780 [ 948.311562] ? lock_downgrade+0x8e0/0x8e0 [ 948.311594] ? refcount_add_not_zero+0x320/0x320 [ 948.311625] kernfs_mount_ns+0x13d/0x8e0 [ 948.311651] ? kernfs_super_ns+0x70/0x70 [ 948.311687] sysfs_mount+0xdf/0x200 [ 948.311707] ? sysfs_kill_sb+0x40/0x40 2033/05/18 03:47:34 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 948.318219] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.319758] ? alloc_pages_current+0x114/0x210 [ 948.319783] ? security_sb_copy_data+0x88/0xb0 [ 948.319810] mount_fs+0xae/0x328 [ 948.319840] vfs_kern_mount.part.34+0xd4/0x4d0 [ 948.319862] ? may_umount+0xb0/0xb0 [ 948.319884] ? _raw_read_unlock+0x22/0x30 [ 948.364241] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.369460] ? __get_fs_type+0x97/0xc0 [ 948.369492] do_mount+0x564/0x3070 [ 948.369515] ? do_raw_spin_unlock+0x9e/0x2e0 [ 948.369543] ? copy_mount_string+0x40/0x40 [ 948.369561] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 948.369588] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 948.369618] ? retint_kernel+0x10/0x10 [ 948.369644] ? copy_mount_options+0x213/0x380 [ 948.377331] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.378826] ? copy_mount_options+0x213/0x380 [ 948.378849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 948.378867] ? copy_mount_options+0x285/0x380 [ 948.378896] ksys_mount+0x12d/0x140 [ 948.378922] __x64_sys_mount+0xbe/0x150 [ 948.378942] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 948.419406] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.423431] do_syscall_64+0x1b1/0x800 [ 948.423452] ? finish_task_switch+0x1ca/0x840 [ 948.423475] ? syscall_return_slowpath+0x5c0/0x5c0 [ 948.423497] ? syscall_return_slowpath+0x30f/0x5c0 [ 948.423525] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 948.423552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 948.423601] entry_SYSCALL_64_after_hwframe+0x49/0xbe 2033/05/18 03:47:34 executing program 6 (fault-call:2 fault-nth:28): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 948.431379] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.432239] RIP: 0033:0x455a09 [ 948.432251] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 948.432273] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 948.432285] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 948.432297] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 948.432308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2033/05/18 03:47:34 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 948.432319] R13: 00000000000004a5 R14: 00000000006fb018 R15: 000000000000001b [ 948.526979] FAULT_INJECTION: forcing a failure. [ 948.526979] name failslab, interval 1, probability 0, space 0, times 0 [ 948.580299] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.580458] CPU: 0 PID: 22157 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 948.590618] kernel msg: ebtables bug: please report to author: Wrong len argument [ 948.595309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.595317] Call Trace: [ 948.595347] dump_stack+0x1b9/0x294 [ 948.595373] ? dump_stack_print_info.cold.2+0x52/0x52 [ 948.595410] should_fail.cold.4+0xa/0x1a [ 948.595434] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 948.595456] ? save_stack+0x43/0xd0 [ 948.595476] ? kmem_cache_alloc_trace+0x152/0x780 [ 948.641465] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 948.646679] ? __list_lru_init+0x456/0x790 [ 948.650931] ? sget_userns+0x767/0xf00 [ 948.654830] ? graph_lock+0x170/0x170 [ 948.658623] ? do_mount+0x564/0x3070 [ 948.662341] ? ksys_mount+0x12d/0x140 [ 948.666144] ? __x64_sys_mount+0xbe/0x150 [ 948.670286] ? do_syscall_64+0x1b1/0x800 [ 948.674351] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.679734] ? find_held_lock+0x36/0x1c0 [ 948.683828] ? __lock_is_held+0xb5/0x140 [ 948.687900] ? check_same_owner+0x320/0x320 [ 948.692236] ? rcu_note_context_switch+0x710/0x710 [ 948.697179] __should_failslab+0x124/0x180 [ 948.701414] should_failslab+0x9/0x14 [ 948.705222] kmem_cache_alloc_trace+0x2cb/0x780 [ 948.709907] ? __kmalloc_node+0x33/0x70 [ 948.713916] ? __kmalloc_node+0x33/0x70 [ 948.717911] ? rcu_read_lock_sched_held+0x108/0x120 [ 948.722937] __memcg_init_list_lru_node+0x17d/0x2c0 [ 948.727949] ? kvfree_rcu+0x20/0x20 [ 948.731592] ? __kmalloc_node+0x47/0x70 [ 948.735598] __list_lru_init+0x456/0x790 [ 948.739666] ? list_lru_destroy+0x4c0/0x4c0 [ 948.743983] ? mark_held_locks+0xc9/0x160 [ 948.748133] ? __raw_spin_lock_init+0x1c/0x100 [ 948.752723] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 948.757758] ? lockdep_init_map+0x9/0x10 [ 948.761839] sget_userns+0x767/0xf00 [ 948.765573] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 948.770239] ? kernfs_sop_show_options+0x190/0x190 [ 948.775180] ? destroy_unused_super.part.11+0x110/0x110 [ 948.780579] ? kasan_check_read+0x11/0x20 [ 948.784732] ? rcu_is_watching+0x85/0x140 [ 948.788873] ? rcu_pm_notify+0xc0/0xc0 [ 948.792872] ? rcu_read_lock_sched_held+0x108/0x120 [ 948.797894] ? kmem_cache_alloc_trace+0x616/0x780 [ 948.802740] ? lock_downgrade+0x8e0/0x8e0 [ 948.806911] ? refcount_add_not_zero+0x320/0x320 [ 948.811716] kernfs_mount_ns+0x13d/0x8e0 [ 948.815787] ? kernfs_super_ns+0x70/0x70 [ 948.819858] sysfs_mount+0xdf/0x200 [ 948.823498] ? sysfs_kill_sb+0x40/0x40 [ 948.827566] ? alloc_pages_current+0x114/0x210 [ 948.832144] ? security_sb_copy_data+0x88/0xb0 [ 948.836743] mount_fs+0xae/0x328 [ 948.840123] vfs_kern_mount.part.34+0xd4/0x4d0 [ 948.844702] ? may_umount+0xb0/0xb0 [ 948.848338] ? _raw_read_unlock+0x22/0x30 [ 948.852488] ? __get_fs_type+0x97/0xc0 [ 948.856374] do_mount+0x564/0x3070 [ 948.859921] ? copy_mount_string+0x40/0x40 [ 948.864165] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 948.869195] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 948.873962] ? retint_kernel+0x10/0x10 [ 948.877871] ? copy_mount_options+0x1f0/0x380 [ 948.882372] ? copy_mount_options+0x1fa/0x380 [ 948.886866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 948.892405] ? copy_mount_options+0x285/0x380 [ 948.896907] ksys_mount+0x12d/0x140 [ 948.900558] __x64_sys_mount+0xbe/0x150 [ 948.904541] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 948.909559] do_syscall_64+0x1b1/0x800 [ 948.913437] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 948.918283] ? syscall_return_slowpath+0x5c0/0x5c0 [ 948.923219] ? syscall_return_slowpath+0x30f/0x5c0 [ 948.928250] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 948.933637] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 948.938497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.943703] RIP: 0033:0x455a09 [ 948.946879] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 948.954578] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 948.961840] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 948.969100] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 948.976379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 948.983650] R13: 00000000000004a5 R14: 00000000006fb018 R15: 000000000000001c [ 948.999751] device lo left promiscuous mode [ 949.009122] device lo entered promiscuous mode [ 949.034877] device lo left promiscuous mode [ 949.055208] device lo entered promiscuous mode [ 949.062270] device lo left promiscuous mode [ 949.074686] device lo entered promiscuous mode 2033/05/18 03:47:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000c3ffffff00"}) 2033/05/18 03:47:35 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x800454df, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:35 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:35 executing program 6 (fault-call:2 fault-nth:29): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x8f04}, 0x2c) 2033/05/18 03:47:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) [ 949.141493] device lo entered promiscuous mode [ 949.153679] kernel msg: ebtables bug: please report to author: Wrong len argument [ 949.171366] kernel msg: ebtables bug: please report to author: Wrong len argument [ 949.172617] FAULT_INJECTION: forcing a failure. [ 949.172617] name failslab, interval 1, probability 0, space 0, times 0 2033/05/18 03:47:35 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 949.191367] CPU: 0 PID: 22189 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 949.198658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.208033] Call Trace: [ 949.210651] dump_stack+0x1b9/0x294 [ 949.214401] ? dump_stack_print_info.cold.2+0x52/0x52 [ 949.219636] should_fail.cold.4+0xa/0x1a [ 949.223736] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 949.228853] ? save_stack+0x43/0xd0 [ 949.232487] ? kmem_cache_alloc_trace+0x152/0x780 2033/05/18 03:47:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x0, 0x8f04000000000000}, 0x2c) [ 949.237356] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 949.242565] ? __list_lru_init+0x456/0x790 [ 949.246821] ? sget_userns+0x767/0xf00 [ 949.250739] ? graph_lock+0x170/0x170 [ 949.254560] ? do_mount+0x564/0x3070 [ 949.258288] ? ksys_mount+0x12d/0x140 [ 949.262103] ? __x64_sys_mount+0xbe/0x150 [ 949.266279] ? do_syscall_64+0x1b1/0x800 [ 949.270363] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.275771] ? find_held_lock+0x36/0x1c0 [ 949.279869] ? __lock_is_held+0xb5/0x140 [ 949.281238] kernel msg: ebtables bug: please report to author: Wrong len argument [ 949.283992] ? check_same_owner+0x320/0x320 [ 949.284024] ? rcu_note_context_switch+0x710/0x710 [ 949.284060] __should_failslab+0x124/0x180 [ 949.284084] should_failslab+0x9/0x14 [ 949.284105] kmem_cache_alloc_trace+0x2cb/0x780 [ 949.313637] ? __kmalloc_node+0x33/0x70 [ 949.317633] ? __kmalloc_node+0x33/0x70 [ 949.321616] ? rcu_read_lock_sched_held+0x108/0x120 [ 949.326656] __memcg_init_list_lru_node+0x17d/0x2c0 [ 949.331689] ? kvfree_rcu+0x20/0x20 [ 949.335327] ? __kmalloc_node+0x47/0x70 [ 949.339319] __list_lru_init+0x456/0x790 [ 949.343386] ? list_lru_destroy+0x4c0/0x4c0 [ 949.347718] ? mark_held_locks+0xc9/0x160 [ 949.351882] ? __raw_spin_lock_init+0x1c/0x100 [ 949.356492] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 949.361548] ? lockdep_init_map+0x9/0x10 [ 949.365630] sget_userns+0x767/0xf00 [ 949.369346] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 949.374031] ? kernfs_sop_show_options+0x190/0x190 [ 949.378990] ? destroy_unused_super.part.11+0x110/0x110 [ 949.384391] ? kasan_check_read+0x11/0x20 [ 949.388543] ? rcu_is_watching+0x85/0x140 [ 949.392697] ? rcu_pm_notify+0xc0/0xc0 [ 949.396607] ? rcu_read_lock_sched_held+0x108/0x120 [ 949.401627] ? kmem_cache_alloc_trace+0x616/0x780 [ 949.406488] ? lock_downgrade+0x8e0/0x8e0 [ 949.410637] ? refcount_add_not_zero+0x320/0x320 [ 949.415396] kernfs_mount_ns+0x13d/0x8e0 [ 949.419458] ? kernfs_super_ns+0x70/0x70 [ 949.423536] sysfs_mount+0xdf/0x200 [ 949.427173] ? sysfs_kill_sb+0x40/0x40 [ 949.431077] ? alloc_pages_current+0x114/0x210 [ 949.435673] ? security_sb_copy_data+0x88/0xb0 [ 949.440266] mount_fs+0xae/0x328 [ 949.443654] vfs_kern_mount.part.34+0xd4/0x4d0 [ 949.448242] ? may_umount+0xb0/0xb0 [ 949.451863] ? _raw_read_unlock+0x22/0x30 [ 949.456001] ? __get_fs_type+0x97/0xc0 [ 949.459912] do_mount+0x564/0x3070 [ 949.463463] ? copy_mount_string+0x40/0x40 [ 949.467708] ? rcu_pm_notify+0xc0/0xc0 [ 949.471623] ? copy_mount_options+0x5f/0x380 [ 949.476042] ? rcu_read_lock_sched_held+0x108/0x120 [ 949.481074] ? kmem_cache_alloc_trace+0x616/0x780 [ 949.485936] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 949.491466] ? _copy_from_user+0xdf/0x150 [ 949.495633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 949.501166] ? copy_mount_options+0x285/0x380 [ 949.505659] ksys_mount+0x12d/0x140 [ 949.509295] __x64_sys_mount+0xbe/0x150 [ 949.513282] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 949.518294] do_syscall_64+0x1b1/0x800 [ 949.522199] ? finish_task_switch+0x1ca/0x840 [ 949.526730] ? syscall_return_slowpath+0x5c0/0x5c0 [ 949.531661] ? syscall_return_slowpath+0x30f/0x5c0 [ 949.536599] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 949.541983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 949.546838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.552027] RIP: 0033:0x455a09 [ 949.555226] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 949.562956] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 949.570236] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 949.577506] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 949.584780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2033/05/18 03:47:35 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 949.592053] R13: 00000000000004a5 R14: 00000000006fb018 R15: 000000000000001d [ 949.603353] device lo left promiscuous mode [ 949.617334] device lo left promiscuous mode 2033/05/18 03:47:35 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000008f04"}, 0x2c) 2033/05/18 03:47:35 executing program 6 (fault-call:2 fault-nth:30): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x0, 0x1000000}, 0x2c) [ 949.642825] device lo entered promiscuous mode [ 949.658706] kernel msg: ebtables bug: please report to author: Wrong len argument [ 949.670839] device lo left promiscuous mode 2033/05/18 03:47:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x800454e0, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 949.713401] device lo entered promiscuous mode [ 949.720345] device lo left promiscuous mode [ 949.739077] kernel msg: ebtables bug: please report to author: Wrong len argument [ 949.783371] FAULT_INJECTION: forcing a failure. [ 949.783371] name failslab, interval 1, probability 0, space 0, times 0 [ 949.794790] CPU: 0 PID: 22227 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 949.802088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.811466] Call Trace: [ 949.814083] dump_stack+0x1b9/0x294 [ 949.817758] ? dump_stack_print_info.cold.2+0x52/0x52 [ 949.822994] should_fail.cold.4+0xa/0x1a [ 949.827084] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 949.832214] ? save_stack+0x43/0xd0 [ 949.835869] ? kmem_cache_alloc_trace+0x152/0x780 [ 949.840731] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 949.845938] ? __list_lru_init+0x456/0x790 [ 949.850187] ? sget_userns+0x767/0xf00 [ 949.854098] ? graph_lock+0x170/0x170 [ 949.857923] ? do_mount+0x564/0x3070 [ 949.861664] ? ksys_mount+0x12d/0x140 [ 949.865492] ? __x64_sys_mount+0xbe/0x150 [ 949.869655] ? do_syscall_64+0x1b1/0x800 [ 949.873711] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.879089] ? find_held_lock+0x36/0x1c0 [ 949.883183] ? __lock_is_held+0xb5/0x140 [ 949.887289] ? check_same_owner+0x320/0x320 [ 949.891648] ? rcu_note_context_switch+0x710/0x710 [ 949.896725] __should_failslab+0x124/0x180 [ 949.900998] should_failslab+0x9/0x14 [ 949.904832] kmem_cache_alloc_trace+0x2cb/0x780 [ 949.909526] ? __kmalloc_node+0x33/0x70 [ 949.913518] ? __kmalloc_node+0x33/0x70 [ 949.917516] ? rcu_read_lock_sched_held+0x108/0x120 [ 949.922566] __memcg_init_list_lru_node+0x17d/0x2c0 [ 949.927617] ? kvfree_rcu+0x20/0x20 [ 949.931271] ? __kmalloc_node+0x47/0x70 [ 949.935289] __list_lru_init+0x456/0x790 [ 949.939390] ? list_lru_destroy+0x4c0/0x4c0 [ 949.943736] ? mark_held_locks+0xc9/0x160 [ 949.948008] ? __raw_spin_lock_init+0x1c/0x100 [ 949.952602] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 949.957620] ? lockdep_init_map+0x9/0x10 [ 949.961678] sget_userns+0x767/0xf00 [ 949.965381] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 949.970059] ? kernfs_sop_show_options+0x190/0x190 [ 949.974991] ? destroy_unused_super.part.11+0x110/0x110 [ 949.980359] ? kasan_check_read+0x11/0x20 [ 949.984497] ? rcu_is_watching+0x85/0x140 [ 949.988636] ? rcu_pm_notify+0xc0/0xc0 [ 949.992523] ? rcu_read_lock_sched_held+0x108/0x120 [ 949.997544] ? kmem_cache_alloc_trace+0x616/0x780 [ 950.002384] ? lock_downgrade+0x8e0/0x8e0 [ 950.006533] ? refcount_add_not_zero+0x320/0x320 [ 950.011287] kernfs_mount_ns+0x13d/0x8e0 [ 950.015353] ? kernfs_super_ns+0x70/0x70 [ 950.019416] sysfs_mount+0xdf/0x200 [ 950.023047] ? sysfs_kill_sb+0x40/0x40 [ 950.026926] ? alloc_pages_current+0x114/0x210 [ 950.031507] ? security_sb_copy_data+0x88/0xb0 [ 950.036092] mount_fs+0xae/0x328 [ 950.039457] vfs_kern_mount.part.34+0xd4/0x4d0 [ 950.044040] ? may_umount+0xb0/0xb0 [ 950.047658] ? _raw_read_unlock+0x22/0x30 [ 950.051792] ? __get_fs_type+0x97/0xc0 [ 950.055687] do_mount+0x564/0x3070 [ 950.059223] ? copy_mount_string+0x40/0x40 [ 950.063468] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 950.068219] ? retint_kernel+0x10/0x10 [ 950.072105] ? copy_mount_options+0x1e3/0x380 [ 950.076605] ? __sanitizer_cov_trace_pc+0x11/0x50 [ 950.081444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.086970] ? copy_mount_options+0x285/0x380 [ 950.091547] ksys_mount+0x12d/0x140 [ 950.095174] __x64_sys_mount+0xbe/0x150 [ 950.099135] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 950.104144] do_syscall_64+0x1b1/0x800 [ 950.108032] ? finish_task_switch+0x1ca/0x840 [ 950.112546] ? syscall_return_slowpath+0x5c0/0x5c0 [ 950.117470] ? syscall_return_slowpath+0x30f/0x5c0 [ 950.122391] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 950.127766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 950.132611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.137787] RIP: 0033:0x455a09 [ 950.140964] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 950.148663] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 950.155921] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 950.163179] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 950.170459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 950.177717] R13: 00000000000004a5 R14: 00000000006fb018 R15: 000000000000001e 2033/05/18 03:47:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000200"}) 2033/05/18 03:47:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x0, 0x8f04}, 0x2c) 2033/05/18 03:47:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x10) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)={0x303, 0x33}, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) 2033/05/18 03:47:36 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:36 executing program 6 (fault-call:2 fault-nth:31): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x800454dd, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00?\x00'}) [ 950.245334] FAULT_INJECTION: forcing a failure. [ 950.245334] name failslab, interval 1, probability 0, space 0, times 0 [ 950.256835] CPU: 0 PID: 22239 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 950.264125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.273506] Call Trace: [ 950.276134] dump_stack+0x1b9/0x294 [ 950.276239] device lo entered promiscuous mode [ 950.279805] ? dump_stack_print_info.cold.2+0x52/0x52 [ 950.279846] should_fail.cold.4+0xa/0x1a 2033/05/18 03:47:36 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e23, 0xffffffff, @mcast1={0xff, 0x1, [], 0x1}, 0x5}}, 0x20, 0x3, 0x3, 0x9, 0x3}, &(0x7f00000000c0)=0x98) perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x4e20}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000000)={'ifb0\x00\x00\x00\x00\x00\b\x00', 0x3}) [ 950.293702] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 950.298834] ? save_stack+0x43/0xd0 [ 950.302489] ? kmem_cache_alloc_trace+0x152/0x780 [ 950.307353] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 950.312562] ? __list_lru_init+0x456/0x790 [ 950.316817] ? sget_userns+0x767/0xf00 [ 950.320724] ? graph_lock+0x170/0x170 [ 950.324543] ? do_mount+0x564/0x3070 [ 950.328277] ? ksys_mount+0x12d/0x140 [ 950.332101] ? __x64_sys_mount+0xbe/0x150 [ 950.336280] ? do_syscall_64+0x1b1/0x800 [ 950.340368] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.345766] ? find_held_lock+0x36/0x1c0 [ 950.349860] ? __lock_is_held+0xb5/0x140 [ 950.353973] ? check_same_owner+0x320/0x320 [ 950.358326] ? rcu_note_context_switch+0x710/0x710 [ 950.363308] __should_failslab+0x124/0x180 [ 950.367586] should_failslab+0x9/0x14 [ 950.371418] kmem_cache_alloc_trace+0x2cb/0x780 [ 950.376109] ? __kmalloc_node+0x33/0x70 [ 950.380106] ? __kmalloc_node+0x33/0x70 [ 950.384113] ? rcu_read_lock_sched_held+0x108/0x120 2033/05/18 03:47:36 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 950.387954] kernel msg: ebtables bug: please report to author: Wrong len argument [ 950.389156] __memcg_init_list_lru_node+0x17d/0x2c0 [ 950.389186] ? kvfree_rcu+0x20/0x20 [ 950.399889] kernel msg: ebtables bug: please report to author: Wrong len argument [ 950.401824] ? __kmalloc_node+0x47/0x70 [ 950.401858] __list_lru_init+0x456/0x790 [ 950.401884] ? list_lru_destroy+0x4c0/0x4c0 [ 950.401904] ? mark_held_locks+0xc9/0x160 [ 950.401926] ? __raw_spin_lock_init+0x1c/0x100 [ 950.401945] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 950.439280] ? lockdep_init_map+0x9/0x10 [ 950.443374] sget_userns+0x767/0xf00 [ 950.447112] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 950.451810] ? kernfs_sop_show_options+0x190/0x190 [ 950.456765] ? destroy_unused_super.part.11+0x110/0x110 [ 950.457291] kernel msg: ebtables bug: please report to author: Wrong len argument [ 950.462160] ? kasan_check_read+0x11/0x20 [ 950.462180] ? rcu_is_watching+0x85/0x140 [ 950.462201] ? rcu_pm_notify+0xc0/0xc0 [ 950.462240] ? rcu_read_lock_sched_held+0x108/0x120 [ 950.462260] ? kmem_cache_alloc_trace+0x616/0x780 [ 950.462278] ? lock_downgrade+0x8e0/0x8e0 2033/05/18 03:47:36 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 950.462303] ? refcount_add_not_zero+0x320/0x320 [ 950.462328] kernfs_mount_ns+0x13d/0x8e0 [ 950.479303] kernel msg: ebtables bug: please report to author: Wrong len argument [ 950.482120] ? kernfs_super_ns+0x70/0x70 [ 950.482161] sysfs_mount+0xdf/0x200 [ 950.482183] ? sysfs_kill_sb+0x40/0x40 [ 950.482207] ? alloc_pages_current+0x114/0x210 [ 950.482226] ? security_sb_copy_data+0x88/0xb0 [ 950.482249] mount_fs+0xae/0x328 [ 950.536833] vfs_kern_mount.part.34+0xd4/0x4d0 [ 950.541432] ? may_umount+0xb0/0xb0 [ 950.545070] ? _raw_read_unlock+0x22/0x30 [ 950.549224] ? __get_fs_type+0x97/0xc0 [ 950.553133] do_mount+0x564/0x3070 [ 950.556683] ? copy_mount_string+0x40/0x40 [ 950.560939] ? rcu_pm_notify+0xc0/0xc0 [ 950.564842] ? copy_mount_options+0x5f/0x380 [ 950.569263] ? rcu_read_lock_sched_held+0x108/0x120 [ 950.574291] ? kmem_cache_alloc_trace+0x616/0x780 [ 950.579160] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 950.584702] ? _copy_from_user+0xdf/0x150 [ 950.588863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.594411] ? copy_mount_options+0x285/0x380 [ 950.598929] ksys_mount+0x12d/0x140 [ 950.602561] __x64_sys_mount+0xbe/0x150 [ 950.606541] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 950.611576] do_syscall_64+0x1b1/0x800 [ 950.615469] ? finish_task_switch+0x1ca/0x840 [ 950.619962] ? syscall_return_slowpath+0x5c0/0x5c0 [ 950.624885] ? syscall_return_slowpath+0x30f/0x5c0 [ 950.629823] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 950.635200] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 950.640073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.645254] RIP: 0033:0x455a09 [ 950.648439] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 950.656169] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 950.663440] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 950.670715] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 950.677989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 950.685253] R13: 00000000000004a5 R14: 00000000006fb018 R15: 000000000000001f 2033/05/18 03:47:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x400454da, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2033/05/18 03:47:36 executing program 6 (fault-call:2 fault-nth:32): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 950.694497] device lo left promiscuous mode [ 950.698372] kernel msg: ebtables bug: please report to author: Wrong len argument [ 950.714310] kernel msg: ebtables bug: please report to author: Wrong len argument [ 950.731176] device lo entered promiscuous mode 2033/05/18 03:47:36 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x0, 0x600}, 0x2c) [ 950.775082] device lo left promiscuous mode [ 950.817198] device lo entered promiscuous mode [ 950.818171] FAULT_INJECTION: forcing a failure. [ 950.818171] name failslab, interval 1, probability 0, space 0, times 0 [ 950.833282] CPU: 0 PID: 22279 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 950.840581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.849958] Call Trace: [ 950.852580] dump_stack+0x1b9/0x294 [ 950.856241] ? dump_stack_print_info.cold.2+0x52/0x52 [ 950.861477] should_fail.cold.4+0xa/0x1a [ 950.865574] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 950.870710] ? save_stack+0x43/0xd0 [ 950.874369] ? kmem_cache_alloc_trace+0x152/0x780 [ 950.879240] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 950.884441] ? __list_lru_init+0x456/0x790 [ 950.888670] ? sget_userns+0x767/0xf00 [ 950.892562] ? graph_lock+0x170/0x170 [ 950.896371] ? do_mount+0x564/0x3070 [ 950.900084] ? ksys_mount+0x12d/0x140 [ 950.903885] ? __x64_sys_mount+0xbe/0x150 [ 950.908037] ? do_syscall_64+0x1b1/0x800 [ 950.912107] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.917495] ? find_held_lock+0x36/0x1c0 [ 950.921581] ? __lock_is_held+0xb5/0x140 [ 950.925676] ? check_same_owner+0x320/0x320 [ 950.929997] ? rcu_note_context_switch+0x710/0x710 [ 950.934952] __should_failslab+0x124/0x180 [ 950.939205] should_failslab+0x9/0x14 [ 950.943035] kmem_cache_alloc_trace+0x2cb/0x780 [ 950.947809] ? __kmalloc_node+0x33/0x70 [ 950.951792] ? __kmalloc_node+0x33/0x70 [ 950.955770] ? rcu_read_lock_sched_held+0x108/0x120 [ 950.960784] __memcg_init_list_lru_node+0x17d/0x2c0 [ 950.965797] ? kvfree_rcu+0x20/0x20 [ 950.969418] ? __kmalloc_node+0x47/0x70 [ 950.973412] __list_lru_init+0x456/0x790 [ 950.977481] ? list_lru_destroy+0x4c0/0x4c0 [ 950.981793] ? mark_held_locks+0xc9/0x160 [ 950.985934] ? __raw_spin_lock_init+0x1c/0x100 [ 950.990524] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 950.995558] ? lockdep_init_map+0x9/0x10 [ 950.999626] sget_userns+0x767/0xf00 [ 951.003332] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 951.008028] ? kernfs_sop_show_options+0x190/0x190 [ 951.012961] ? destroy_unused_super.part.11+0x110/0x110 [ 951.018334] ? kasan_check_read+0x11/0x20 [ 951.022497] ? rcu_is_watching+0x85/0x140 [ 951.026668] ? rcu_pm_notify+0xc0/0xc0 [ 951.030559] ? rcu_read_lock_sched_held+0x108/0x120 [ 951.035569] ? kmem_cache_alloc_trace+0x616/0x780 [ 951.040427] ? lock_downgrade+0x8e0/0x8e0 [ 951.044590] ? refcount_add_not_zero+0x320/0x320 [ 951.049367] kernfs_mount_ns+0x13d/0x8e0 [ 951.053429] ? kernfs_super_ns+0x70/0x70 [ 951.057517] sysfs_mount+0xdf/0x200 [ 951.061159] ? sysfs_kill_sb+0x40/0x40 [ 951.065058] ? alloc_pages_current+0x114/0x210 [ 951.069642] ? security_sb_copy_data+0x88/0xb0 [ 951.074229] mount_fs+0xae/0x328 [ 951.077626] vfs_kern_mount.part.34+0xd4/0x4d0 [ 951.082218] ? may_umount+0xb0/0xb0 [ 951.085855] ? _raw_read_unlock+0x22/0x30 [ 951.090012] ? __get_fs_type+0x97/0xc0 [ 951.093908] do_mount+0x564/0x3070 [ 951.097457] ? copy_mount_string+0x40/0x40 [ 951.101702] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 951.106486] ? retint_kernel+0x10/0x10 [ 951.110383] ? copy_mount_options+0x1a1/0x380 [ 951.114887] ? __sanitizer_cov_trace_pc+0x38/0x50 [ 951.119739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.125290] ? copy_mount_options+0x285/0x380 [ 951.129810] ksys_mount+0x12d/0x140 [ 951.133439] __x64_sys_mount+0xbe/0x150 [ 951.137412] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 951.142433] do_syscall_64+0x1b1/0x800 [ 951.146313] ? finish_task_switch+0x1ca/0x840 [ 951.150807] ? syscall_return_slowpath+0x5c0/0x5c0 [ 951.155751] ? syscall_return_slowpath+0x30f/0x5c0 [ 951.160692] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 951.166064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 951.170936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.176129] RIP: 0033:0x455a09 [ 951.179315] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 951.187651] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 951.194936] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 951.202197] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 951.209470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 951.216741] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000020 [ 951.230898] kernel msg: ebtables bug: please report to author: Wrong len argument [ 951.235405] device lo left promiscuous mode [ 951.260234] device lo entered promiscuous mode [ 951.271163] kernel msg: ebtables bug: please report to author: Wrong len argument [ 951.283676] device lo left promiscuous mode 2033/05/18 03:47:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000f5ffffff00"}) 2033/05/18 03:47:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7ff, 0x380) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="08000000f8ff0e94e724944c34a40ba3a16146b5815d4d095d0e119c9d658abed5a7ec48887c6c386fe018d7fa7f11be66580e80203356fde4cb4a3ae5f8ac368276648b54300e806dba8fcd994117f3058df9eaf1c910240158c88cf4118124b970e56cc9d2eadb8a5f985914131ab98673b55b12538811aa800a333d9966c5dbc20100000000000000adc52e32acadc8cb8418e765c1f3528d1620039b3ba938f49f32fd03f53a3ceea9c61bc465eac6922e4fab2048efef5bbf70375af3f063540094ed2b6f1b62727b"]) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e24}}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000001c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x80000, 0x20) getsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000200), &(0x7f0000000240)=0x4) connect$rds(r3, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0x1}, 0x10) openat(r3, &(0x7f0000000100)='./file1\x00', 0x101001, 0x71) accept$inet6(r3, &(0x7f0000002880)={0x0, 0x0, 0x0, @mcast1}, &(0x7f00000028c0)=0x1c) 2033/05/18 03:47:37 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000600", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:37 executing program 6 (fault-call:2 fault-nth:33): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00'}, 0x2c) 2033/05/18 03:47:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f0000000000c3ffffff00"}) 2033/05/18 03:47:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x0, 0x48f}, 0x2c) 2033/05/18 03:47:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x801054db, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 951.399144] device lo entered promiscuous mode [ 951.399307] kernel msg: ebtables bug: please report to author: Wrong len argument [ 951.421708] kernel msg: ebtables bug: please report to author: Wrong len argument [ 951.426866] FAULT_INJECTION: forcing a failure. [ 951.426866] name failslab, interval 1, probability 0, space 0, times 0 [ 951.440761] CPU: 0 PID: 22309 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 951.448056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.457518] Call Trace: [ 951.460134] dump_stack+0x1b9/0x294 [ 951.463796] ? dump_stack_print_info.cold.2+0x52/0x52 [ 951.469031] should_fail.cold.4+0xa/0x1a [ 951.473128] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 951.478282] ? save_stack+0x43/0xd0 [ 951.481962] ? kmem_cache_alloc_trace+0x152/0x780 [ 951.486840] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 951.492064] ? __list_lru_init+0x456/0x790 2033/05/18 03:47:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f000000000000000000000000048f"}, 0x2c) 2033/05/18 03:47:37 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "0000000000000000000000000400", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 951.496327] ? sget_userns+0x767/0xf00 [ 951.500240] ? graph_lock+0x170/0x170 [ 951.504060] ? do_mount+0x564/0x3070 [ 951.507792] ? ksys_mount+0x12d/0x140 [ 951.511611] ? __x64_sys_mount+0xbe/0x150 [ 951.515779] ? do_syscall_64+0x1b1/0x800 [ 951.519861] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.525254] ? find_held_lock+0x36/0x1c0 [ 951.529352] ? __lock_is_held+0xb5/0x140 [ 951.533463] ? check_same_owner+0x320/0x320 [ 951.537821] ? rcu_note_context_switch+0x710/0x710 [ 951.542791] __should_failslab+0x124/0x180 [ 951.547062] should_failslab+0x9/0x14 [ 951.550893] kmem_cache_alloc_trace+0x2cb/0x780 [ 951.555585] ? __kmalloc_node+0x33/0x70 [ 951.559587] ? __kmalloc_node+0x33/0x70 [ 951.563592] ? rcu_read_lock_sched_held+0x108/0x120 [ 951.568624] __memcg_init_list_lru_node+0x17d/0x2c0 [ 951.573646] ? kvfree_rcu+0x20/0x20 [ 951.577297] ? __kmalloc_node+0x47/0x70 [ 951.581303] __list_lru_init+0x456/0x790 [ 951.585366] ? list_lru_destroy+0x4c0/0x4c0 [ 951.589689] ? mark_held_locks+0xc9/0x160 [ 951.593850] ? __raw_spin_lock_init+0x1c/0x100 [ 951.598439] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 951.603471] ? lockdep_init_map+0x9/0x10 [ 951.607551] sget_userns+0x767/0xf00 [ 951.611271] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 951.615943] ? kernfs_sop_show_options+0x190/0x190 [ 951.620878] ? destroy_unused_super.part.11+0x110/0x110 [ 951.626270] ? kasan_check_read+0x11/0x20 [ 951.630448] ? rcu_is_watching+0x85/0x140 [ 951.634605] ? rcu_pm_notify+0xc0/0xc0 [ 951.638511] ? rcu_read_lock_sched_held+0x108/0x120 [ 951.643534] ? kmem_cache_alloc_trace+0x616/0x780 [ 951.648383] ? lock_downgrade+0x8e0/0x8e0 [ 951.652548] ? refcount_add_not_zero+0x320/0x320 [ 951.657329] kernfs_mount_ns+0x13d/0x8e0 [ 951.661397] ? kernfs_super_ns+0x70/0x70 [ 951.665460] sysfs_mount+0xdf/0x200 [ 951.669092] ? sysfs_kill_sb+0x40/0x40 [ 951.672991] ? alloc_pages_current+0x114/0x210 [ 951.677573] ? security_sb_copy_data+0x88/0xb0 [ 951.682166] mount_fs+0xae/0x328 [ 951.685539] vfs_kern_mount.part.34+0xd4/0x4d0 [ 951.690116] ? may_umount+0xb0/0xb0 [ 951.693749] ? _raw_read_unlock+0x22/0x30 [ 951.697896] ? __get_fs_type+0x97/0xc0 [ 951.701797] do_mount+0x564/0x3070 [ 951.705346] ? copy_mount_string+0x40/0x40 [ 951.709592] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 951.714354] ? retint_kernel+0x10/0x10 [ 951.718265] ? copy_mount_options+0x1f0/0x380 [ 951.722774] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 951.727619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.733144] ? copy_mount_options+0x285/0x380 [ 951.737635] ksys_mount+0x12d/0x140 [ 951.741275] __x64_sys_mount+0xbe/0x150 [ 951.745246] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 951.750283] do_syscall_64+0x1b1/0x800 [ 951.754174] ? finish_task_switch+0x1ca/0x840 [ 951.758670] ? syscall_return_slowpath+0x5c0/0x5c0 [ 951.763602] ? syscall_return_slowpath+0x30f/0x5c0 [ 951.768537] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 951.773895] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 951.778764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.783954] RIP: 0033:0x455a09 [ 951.787140] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 951.794841] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 951.802113] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 951.809376] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 951.816658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 951.823928] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000021 [ 951.835242] device lo left promiscuous mode [ 951.837535] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x0, 0x6}, 0x2c) 2033/05/18 03:47:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'ip6_vti0\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) [ 951.847835] device lo entered promiscuous mode [ 951.856694] device lo left promiscuous mode [ 951.871781] kernel msg: ebtables bug: please report to author: Wrong len argument [ 951.879873] device lo entered promiscuous mode [ 951.897146] device lo left promiscuous mode 2033/05/18 03:47:38 executing program 6 (fault-call:2 fault-nth:34): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 951.913243] device lo entered promiscuous mode [ 951.933361] device lo left promiscuous mode [ 951.994376] FAULT_INJECTION: forcing a failure. [ 951.994376] name failslab, interval 1, probability 0, space 0, times 0 [ 952.006115] CPU: 0 PID: 22339 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 952.013421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.022800] Call Trace: [ 952.025434] dump_stack+0x1b9/0x294 [ 952.029101] ? dump_stack_print_info.cold.2+0x52/0x52 [ 952.034323] ? lock_downgrade+0x8e0/0x8e0 [ 952.038530] should_fail.cold.4+0xa/0x1a [ 952.042631] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 952.047775] ? print_usage_bug+0xc0/0xc0 [ 952.051866] ? print_usage_bug+0xc0/0xc0 [ 952.055954] ? graph_lock+0x170/0x170 [ 952.059794] ? find_held_lock+0x36/0x1c0 [ 952.063892] ? __lock_is_held+0xb5/0x140 [ 952.068004] ? check_same_owner+0x320/0x320 [ 952.072347] ? lockdep_init_map+0x9/0x10 [ 952.076433] ? rcu_note_context_switch+0x710/0x710 [ 952.081393] ? kasan_check_write+0x14/0x20 [ 952.085657] ? __init_rwsem+0x1c4/0x290 [ 952.089667] __should_failslab+0x124/0x180 [ 952.093934] should_failslab+0x9/0x14 [ 952.097753] __kmalloc+0x2c8/0x760 [ 952.101295] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 952.106340] ? prealloc_shrinker+0xcf/0x130 [ 952.110690] prealloc_shrinker+0xcf/0x130 [ 952.114845] sget_userns+0x9b2/0xf00 [ 952.118551] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 952.123225] ? kernfs_sop_show_options+0x190/0x190 [ 952.128172] ? destroy_unused_super.part.11+0x110/0x110 [ 952.133554] ? kasan_check_read+0x11/0x20 [ 952.137694] ? rcu_is_watching+0x85/0x140 [ 952.141836] ? rcu_pm_notify+0xc0/0xc0 [ 952.145741] ? rcu_read_lock_sched_held+0x108/0x120 [ 952.150761] ? kmem_cache_alloc_trace+0x616/0x780 [ 952.155608] ? lock_downgrade+0x8e0/0x8e0 [ 952.159758] ? refcount_add_not_zero+0x320/0x320 [ 952.164512] kernfs_mount_ns+0x13d/0x8e0 [ 952.168588] ? kernfs_super_ns+0x70/0x70 [ 952.172663] sysfs_mount+0xdf/0x200 [ 952.176302] ? sysfs_kill_sb+0x40/0x40 [ 952.180193] ? alloc_pages_current+0x114/0x210 [ 952.184769] ? security_sb_copy_data+0x88/0xb0 [ 952.189357] mount_fs+0xae/0x328 [ 952.192725] vfs_kern_mount.part.34+0xd4/0x4d0 [ 952.197300] ? may_umount+0xb0/0xb0 [ 952.200916] ? _raw_read_unlock+0x22/0x30 [ 952.205054] ? __get_fs_type+0x97/0xc0 [ 952.208953] do_mount+0x564/0x3070 [ 952.212502] ? copy_mount_string+0x40/0x40 [ 952.216814] ? rcu_pm_notify+0xc0/0xc0 [ 952.220697] ? copy_mount_options+0x5f/0x380 [ 952.225096] ? rcu_read_lock_sched_held+0x108/0x120 [ 952.230103] ? kmem_cache_alloc_trace+0x616/0x780 [ 952.234946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 952.240487] ? _copy_from_user+0xdf/0x150 [ 952.244635] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.250160] ? copy_mount_options+0x285/0x380 [ 952.254679] ksys_mount+0x12d/0x140 [ 952.258328] __x64_sys_mount+0xbe/0x150 [ 952.262306] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 952.267317] do_syscall_64+0x1b1/0x800 [ 952.271191] ? finish_task_switch+0x1ca/0x840 [ 952.275677] ? syscall_return_slowpath+0x5c0/0x5c0 [ 952.280597] ? syscall_return_slowpath+0x30f/0x5c0 [ 952.285523] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 952.290883] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 952.295725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.300916] RIP: 0033:0x455a09 [ 952.304091] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 952.311795] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 952.319061] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 952.326332] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 952.333600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 952.340858] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000022 2033/05/18 03:47:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000001800"}) 2033/05/18 03:47:38 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) 2033/05/18 03:47:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000006"}, 0x2c) 2033/05/18 03:47:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x1) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"6c6f00000000000200"}) 2033/05/18 03:47:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'fo\x00', 0x0, 0x100000000000000}, 0x2c) 2033/05/18 03:47:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x200) set_tid_address(&(0x7f00000000c0)) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000080)) 2033/05/18 03:47:38 executing program 6 (fault-call:2 fault-nth:35): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) 2033/05/18 03:47:38 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"69000200000f002dc830ee26e3008000", 0x10a}) ioctl$TUNSETTXFILTER(r0, 0x894c, &(0x7f0000000080)={0x1, 0x4, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"69000200000f002dc830ee000000005d"}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x77) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 952.431325] kernel msg: ebtables bug: please report to author: Wrong len argument [ 952.439840] device lo entered promiscuous mode [ 952.451728] device lo entered promiscuous mode [ 952.457236] FAULT_INJECTION: forcing a failure. [ 952.457236] name failslab, interval 1, probability 0, space 0, times 0 [ 952.468634] CPU: 0 PID: 22363 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 952.475931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.485312] Call Trace: [ 952.487928] dump_stack+0x1b9/0x294 [ 952.491592] ? dump_stack_print_info.cold.2+0x52/0x52 [ 952.496830] should_fail.cold.4+0xa/0x1a [ 952.500934] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 952.506074] ? save_stack+0x43/0xd0 [ 952.509731] ? kmem_cache_alloc_trace+0x152/0x780 [ 952.514605] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 952.519822] ? __list_lru_init+0x456/0x790 [ 952.524083] ? sget_userns+0x767/0xf00 [ 952.528001] ? graph_lock+0x170/0x170 2033/05/18 03:47:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x400000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, "666f0000000000000000000000000600"}, 0x2c) 2033/05/18 03:47:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2}}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x2, 0x4) 2033/05/18 03:47:38 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 952.531891] ? do_mount+0x564/0x3070 [ 952.535626] ? ksys_mount+0x12d/0x140 [ 952.539451] ? __x64_sys_mount+0xbe/0x150 [ 952.543622] ? do_syscall_64+0x1b1/0x800 [ 952.545518] kernel msg: ebtables bug: please report to author: Wrong len argument [ 952.547719] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.547750] ? find_held_lock+0x36/0x1c0 [ 952.547778] ? __lock_is_held+0xb5/0x140 [ 952.568907] ? check_same_owner+0x320/0x320 [ 952.573264] ? rcu_note_context_switch+0x710/0x710 [ 952.578242] __should_failslab+0x124/0x180 [ 952.582508] should_failslab+0x9/0x14 [ 952.586338] kmem_cache_alloc_trace+0x2cb/0x780 [ 952.591031] ? __kmalloc_node+0x33/0x70 [ 952.595027] ? __kmalloc_node+0x33/0x70 [ 952.599030] ? rcu_read_lock_sched_held+0x108/0x120 [ 952.600341] kernel msg: ebtables bug: please report to author: Wrong len argument [ 952.604077] __memcg_init_list_lru_node+0x17d/0x2c0 [ 952.604102] ? kvfree_rcu+0x20/0x20 [ 952.604123] ? __kmalloc_node+0x47/0x70 [ 952.604155] __list_lru_init+0x456/0x790 2033/05/18 03:47:38 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000200", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 952.604181] ? list_lru_destroy+0x4c0/0x4c0 [ 952.604206] ? mark_held_locks+0xc9/0x160 [ 952.604230] ? __raw_spin_lock_init+0x1c/0x100 [ 952.615185] kernel msg: ebtables bug: please report to author: Wrong len argument [ 952.616867] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 952.616899] ? lockdep_init_map+0x9/0x10 [ 952.616926] sget_userns+0x767/0xf00 [ 952.616944] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 952.616975] ? kernfs_sop_show_options+0x190/0x190 [ 952.663835] kernel msg: ebtables bug: please report to author: Wrong len argument 2033/05/18 03:47:38 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000000000100", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 952.666709] ? destroy_unused_super.part.11+0x110/0x110 [ 952.666749] ? kasan_check_read+0x11/0x20 [ 952.666768] ? rcu_is_watching+0x85/0x140 [ 952.666789] ? rcu_pm_notify+0xc0/0xc0 [ 952.666828] ? rcu_read_lock_sched_held+0x108/0x120 [ 952.666848] ? kmem_cache_alloc_trace+0x616/0x780 [ 952.666865] ? lock_downgrade+0x8e0/0x8e0 [ 952.666888] ? refcount_add_not_zero+0x320/0x320 [ 952.674649] kernel msg: ebtables bug: please report to author: Wrong len argument [ 952.679470] kernfs_mount_ns+0x13d/0x8e0 [ 952.679496] ? kernfs_super_ns+0x70/0x70 2033/05/18 03:47:38 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 952.679535] sysfs_mount+0xdf/0x200 [ 952.679557] ? sysfs_kill_sb+0x40/0x40 [ 952.679579] ? alloc_pages_current+0x114/0x210 [ 952.679600] ? security_sb_copy_data+0x88/0xb0 [ 952.723361] kernel msg: ebtables bug: please report to author: Wrong len argument [ 952.723469] mount_fs+0xae/0x328 [ 952.723496] vfs_kern_mount.part.34+0xd4/0x4d0 [ 952.729741] kernel msg: ebtables bug: please report to author: Wrong len argument [ 952.731617] ? may_umount+0xb0/0xb0 [ 952.731639] ? _raw_read_unlock+0x22/0x30 2033/05/18 03:47:38 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xc78, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, "00000000000300", 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_bridge\x00', 'bcsh0\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x110, 0x140, 0x170, [@connlabel={'connlabel\x00', 0x8}, @rateest={'rateest\x00', 0x48, {{'vcan0\x00', 'ip6tnl0\x00'}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00', 'bridge_slave_1\x00', 'tunl0\x00', @random="20ec028ce0e8", [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x858, 0x888, 0x900, [@u32={'u32\x00', 0x7c0}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "b2080204c6fa806d6ab727047f9d436ecbdd10652c09f0d3a48612f7a43e3ab4ad849cab9ca12917c5dd34856d5463512ce5811bc143b57508bccee883276201"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x8, 0x8914, 'vlan0\x00', 'bond_slave_0\x00', 'ipddp0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xd0, 0x148}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7f}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x9, 0x2, 0x0, 0x0, "ee1586b89c7a72c186f4403c08f382fd3c513579aab25b72adf42d95e7dc3c333e9029ac83f245d70660548e0753bc140f218eb15453ca50c14e860cd30fcd6d"}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0xf58) [ 952.731657] ? __get_fs_type+0x97/0xc0 [ 952.731687] do_mount+0x564/0x3070 [ 952.731707] ? do_raw_spin_unlock+0x9e/0x2e0 [ 952.731731] ? copy_mount_string+0x40/0x40 [ 952.731750] ? rcu_pm_notify+0xc0/0xc0 [ 952.772875] kernel msg: ebtables bug: please report to author: Wrong len argument [ 952.775242] ? copy_mount_options+0x5f/0x380 [ 952.775263] ? rcu_read_lock_sched_held+0x108/0x120 [ 952.775285] ? kmem_cache_alloc_trace+0x616/0x780 [ 952.775313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 952.775344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.775362] ? copy_mount_options+0x285/0x380 [ 952.775390] ksys_mount+0x12d/0x140 [ 952.782447] kernel msg: ebtables bug: please report to author: Wrong len argument [ 952.783428] __x64_sys_mount+0xbe/0x150 [ 952.783448] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 952.783473] do_syscall_64+0x1b1/0x800 [ 952.783492] ? finish_task_switch+0x1ca/0x840 [ 952.783515] ? syscall_return_slowpath+0x5c0/0x5c0 [ 952.783538] ? syscall_return_slowpath+0x30f/0x5c0 2033/05/18 03:47:38 executing program 6 (fault-call:2 fault-nth:36): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f00000000c0)) [ 952.825909] kernel msg: ebtables bug: please report to author: Wrong len argument [ 952.826986] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 952.827022] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 952.827057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.827072] RIP: 0033:0x455a09 [ 952.827083] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 952.827105] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 952.827117] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 952.827131] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 952.827145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 952.827160] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000023 [ 952.835566] kernel msg: ebtables bug: please report to author: Wrong len argument [ 952.927876] FAULT_INJECTION: forcing a failure. [ 952.927876] name failslab, interval 1, probability 0, space 0, times 0 [ 952.932992] device lo left promiscuous mode [ 952.939613] CPU: 0 PID: 22392 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 952.939632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.987148] Call Trace: [ 952.989775] dump_stack+0x1b9/0x294 [ 952.993439] ? dump_stack_print_info.cold.2+0x52/0x52 [ 952.998653] should_fail.cold.4+0xa/0x1a [ 953.002736] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 953.007871] ? perf_trace_lock+0x495/0x900 [ 953.012120] ? graph_lock+0x170/0x170 [ 953.015922] ? zap_class+0x720/0x720 [ 953.019634] ? find_held_lock+0x36/0x1c0 [ 953.023702] ? __lock_is_held+0xb5/0x140 [ 953.027771] ? check_same_owner+0x320/0x320 [ 953.032100] ? rcu_note_context_switch+0x710/0x710 [ 953.037050] __should_failslab+0x124/0x180 [ 953.041306] should_failslab+0x9/0x14 [ 953.045123] kmem_cache_alloc+0x2af/0x760 [ 953.049280] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 953.054311] __d_alloc+0xc0/0xd30 [ 953.057779] ? shrink_dcache_for_umount+0x290/0x290 [ 953.062802] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 953.067749] ? lock_downgrade+0x8e0/0x8e0 [ 953.071914] ? wait_for_completion+0x870/0x870 [ 953.076506] ? kasan_check_read+0x11/0x20 [ 953.080667] ? do_raw_spin_unlock+0x9e/0x2e0 [ 953.085088] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 953.089681] ? kasan_check_write+0x14/0x20 [ 953.093912] ? do_raw_spin_lock+0xc1/0x200 [ 953.098167] ? _raw_spin_unlock+0x22/0x30 [ 953.102320] ? unlock_new_inode+0xf7/0x130 [ 953.106552] d_make_root+0x42/0x90 [ 953.110102] kernfs_mount_ns+0x503/0x8e0 [ 953.114172] ? kernfs_super_ns+0x70/0x70 [ 953.118242] sysfs_mount+0xdf/0x200 [ 953.121873] ? sysfs_kill_sb+0x40/0x40 [ 953.125762] ? alloc_pages_current+0x114/0x210 [ 953.130337] ? security_sb_copy_data+0x88/0xb0 [ 953.134916] mount_fs+0xae/0x328 [ 953.138288] vfs_kern_mount.part.34+0xd4/0x4d0 [ 953.142875] ? may_umount+0xb0/0xb0 [ 953.146520] ? _raw_read_unlock+0x22/0x30 [ 953.150667] ? __get_fs_type+0x97/0xc0 [ 953.154552] do_mount+0x564/0x3070 [ 953.158091] ? copy_mount_string+0x40/0x40 [ 953.162331] ? rcu_pm_notify+0xc0/0xc0 [ 953.166249] ? copy_mount_options+0x5f/0x380 [ 953.170657] ? rcu_read_lock_sched_held+0x108/0x120 [ 953.175667] ? kmem_cache_alloc_trace+0x616/0x780 [ 953.180505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 953.186706] ? _copy_from_user+0xdf/0x150 [ 953.190860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 953.196392] ? copy_mount_options+0x285/0x380 [ 953.200884] ksys_mount+0x12d/0x140 [ 953.204510] __x64_sys_mount+0xbe/0x150 [ 953.208480] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 953.213508] do_syscall_64+0x1b1/0x800 [ 953.217392] ? finish_task_switch+0x1ca/0x840 [ 953.221879] ? syscall_return_slowpath+0x5c0/0x5c0 [ 953.226810] ? syscall_return_slowpath+0x30f/0x5c0 [ 953.231754] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 953.237124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 953.241968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 953.247187] RIP: 0033:0x455a09 [ 953.250373] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 953.258182] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 953.265455] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 953.272725] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 953.279985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 953.287253] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000024 [ 953.299201] device lo left promiscuous mode [ 953.302376] kasan: CONFIG_KASAN_INLINE enabled [ 953.308650] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 953.316270] general protection fault: 0000 [#1] SMP KASAN [ 953.321825] Dumping ftrace buffer: [ 953.325113] device lo entered promiscuous mode [ 953.325366] (ftrace buffer empty) [ 953.333642] Modules linked in: [ 953.336854] CPU: 0 PID: 22392 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #54 [ 953.344177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.353556] RIP: 0010:__list_del_entry_valid+0x84/0xf3 [ 953.358835] RSP: 0018:ffff8801b76b7860 EFLAGS: 00010246 [ 953.364218] RAX: dffffc0000000000 RBX: ffff8801cc685e98 RCX: 0000000000000000 [ 953.371588] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8801cc685ea0 [ 953.378845] RBP: ffff8801b76b7878 R08: fffffbfff11cc7c5 R09: fffffbfff11cc7c4 [ 953.386103] R10: ffff8801b76b7878 R11: ffffffff88e63e27 R12: 0000000000000000 [ 953.393363] R13: 0000000000000000 R14: ffff8801b76b7908 R15: ffff8801cc685e98 [ 953.400633] FS: 00007f20bb2ae700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 953.408859] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 953.414729] CR2: 0000000000625208 CR3: 00000001cb00a000 CR4: 00000000001406f0 [ 953.421987] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 953.429248] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 953.436504] Call Trace: [ 953.439084] kernfs_kill_sb+0xa0/0x350 [ 953.442962] ? unregister_shrinker+0x23a/0x3a0 [ 953.447531] ? kernfs_mount_ns+0x8e0/0x8e0 [ 953.451752] ? perf_trace_mm_vmscan_writepage+0x750/0x750 [ 953.457281] ? _raw_spin_unlock+0x22/0x30 [ 953.461419] sysfs_kill_sb+0x22/0x40 [ 953.465142] deactivate_locked_super+0x97/0x100 [ 953.469798] kernfs_mount_ns+0x753/0x8e0 [ 953.473847] ? kernfs_super_ns+0x70/0x70 [ 953.477900] sysfs_mount+0xdf/0x200 [ 953.481512] ? sysfs_kill_sb+0x40/0x40 [ 953.485387] ? alloc_pages_current+0x114/0x210 [ 953.489955] ? security_sb_copy_data+0x88/0xb0 [ 953.494522] mount_fs+0xae/0x328 [ 953.497875] vfs_kern_mount.part.34+0xd4/0x4d0 [ 953.502444] ? may_umount+0xb0/0xb0 [ 953.506058] ? _raw_read_unlock+0x22/0x30 [ 953.510188] ? __get_fs_type+0x97/0xc0 [ 953.514067] do_mount+0x564/0x3070 [ 953.517609] ? copy_mount_string+0x40/0x40 [ 953.521857] ? rcu_pm_notify+0xc0/0xc0 [ 953.525734] ? copy_mount_options+0x5f/0x380 [ 953.530129] ? rcu_read_lock_sched_held+0x108/0x120 [ 953.535134] ? kmem_cache_alloc_trace+0x616/0x780 [ 953.539965] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 953.545489] ? _copy_from_user+0xdf/0x150 [ 953.549625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 953.555153] ? copy_mount_options+0x285/0x380 [ 953.559634] ksys_mount+0x12d/0x140 [ 953.563249] __x64_sys_mount+0xbe/0x150 [ 953.567207] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 953.572210] do_syscall_64+0x1b1/0x800 [ 953.576082] ? finish_task_switch+0x1ca/0x840 [ 953.580572] ? syscall_return_slowpath+0x5c0/0x5c0 [ 953.585486] ? syscall_return_slowpath+0x30f/0x5c0 [ 953.590403] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 953.595755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 953.600588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 953.605759] RIP: 0033:0x455a09 [ 953.608931] RSP: 002b:00007f20bb2adc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 953.616624] RAX: ffffffffffffffda RBX: 00007f20bb2ae6d4 RCX: 0000000000455a09 [ 953.623875] RDX: 0000000020000040 RSI: 0000000020000240 RDI: 0000000020000000 [ 953.631132] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000000 [ 953.638386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 953.645645] R13: 00000000000004a5 R14: 00000000006fb018 R15: 0000000000000024 [ 953.652919] Code: c5 0f 84 cc 00 00 00 48 b8 00 02 00 00 00 00 ad de 49 39 c4 0f 84 a5 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 75 5f 49 8b 14 24 48 39 da 0f 85 ba 00 00 00 48 b8 [ 953.672242] RIP: __list_del_entry_valid+0x84/0xf3 RSP: ffff8801b76b7860 [ 953.679164] ---[ end trace 87dbd724741fbc4a ]--- [ 953.683953] Kernel panic - not syncing: Fatal exception [ 953.689757] Dumping ftrace buffer: [ 953.693284] (ftrace buffer empty) [ 953.696973] Kernel Offset: disabled [ 953.700588] Rebooting in 86400 seconds..