[ OK ] Started Getty on tty1. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started System Logging Service. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.245' (ECDSA) to the list of known hosts. 2020/05/06 03:15:27 fuzzer started 2020/05/06 03:15:27 dialing manager at 10.128.0.26:41671 2020/05/06 03:15:28 syscalls: 2953 2020/05/06 03:15:28 code coverage: enabled 2020/05/06 03:15:28 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/05/06 03:15:28 extra coverage: enabled 2020/05/06 03:15:28 setuid sandbox: enabled 2020/05/06 03:15:28 namespace sandbox: enabled 2020/05/06 03:15:28 Android sandbox: enabled 2020/05/06 03:15:28 fault injection: enabled 2020/05/06 03:15:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/06 03:15:28 net packet injection: enabled 2020/05/06 03:15:28 net device setup: enabled 2020/05/06 03:15:28 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/06 03:15:28 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/06 03:15:28 USB emulation: /dev/raw-gadget does not exist 03:17:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="d7cf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r3, 0x0) syzkaller login: [ 233.716524][ T32] audit: type=1400 audit(1588735052.989:8): avc: denied { execmem } for pid=8843 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 234.050282][ T8844] IPVS: ftp: loaded support on port[0] = 21 [ 234.397975][ T8844] chnl_net:caif_netlink_parms(): no params data found [ 234.659669][ T8844] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.667752][ T8844] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.677755][ T8844] device bridge_slave_0 entered promiscuous mode [ 234.691622][ T8844] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.699169][ T8844] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.710789][ T8844] device bridge_slave_1 entered promiscuous mode [ 234.778687][ T8844] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.796069][ T8844] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.861503][ T8844] team0: Port device team_slave_0 added [ 234.875495][ T8844] team0: Port device team_slave_1 added [ 234.927325][ T8844] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 234.935289][ T8844] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 234.962613][ T8844] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 234.978947][ T8844] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 234.986020][ T8844] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.014446][ T8844] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 235.285578][ T8844] device hsr_slave_0 entered promiscuous mode [ 235.409686][ T8844] device hsr_slave_1 entered promiscuous mode [ 236.083841][ T8844] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 236.136946][ T8844] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 236.197128][ T8844] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 236.448295][ T8844] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 236.926210][ T8844] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.976426][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.986549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.012724][ T8844] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.038692][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.051681][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.061985][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.069923][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.090616][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.112308][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.122783][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.132857][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.140306][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.190020][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.200608][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.212242][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.223818][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.273758][ T8844] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 237.284899][ T8844] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 237.308093][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.317825][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.328358][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.339406][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.349939][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.360441][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.371058][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.444009][ T8844] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.459253][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.469947][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.477918][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.528090][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 237.538686][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.599764][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 237.610078][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.637904][ T8844] device veth0_vlan entered promiscuous mode [ 237.646498][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.657483][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.695603][ T8844] device veth1_vlan entered promiscuous mode [ 237.718385][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 237.790308][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 237.803046][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 237.828007][ T8844] device veth0_macvtap entered promiscuous mode [ 237.852640][ T8844] device veth1_macvtap entered promiscuous mode [ 237.911201][ T8844] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 237.919366][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 237.930053][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 237.940563][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 237.951350][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.974513][ T8844] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 237.983945][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 237.995164][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.539400][ T9066] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 238.617582][ C1] hrtimer: interrupt took 66115 ns 03:17:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="d7cf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r3, 0x0) 03:17:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 239.258287][ T9087] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 239.274760][ T9087] device ip6_vti0 entered promiscuous mode 03:17:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 239.700455][ T9100] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 239.714243][ T9100] device syz_tun entered promiscuous mode 03:17:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 240.087898][ T9109] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 240.116710][ T9109] device vcan0 entered promiscuous mode 03:17:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 240.448983][ T9117] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 240.477023][ T9117] device dummy0 entered promiscuous mode 03:17:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000500)='btrfs\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}) [ 240.925481][ T9123] IPVS: ftp: loaded support on port[0] = 21 03:17:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) [ 241.338269][ T9123] chnl_net:caif_netlink_parms(): no params data found 03:17:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) [ 241.680189][ T9123] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.688885][ T9123] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.698669][ T9123] device bridge_slave_0 entered promiscuous mode 03:17:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) [ 241.749829][ T9123] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.757488][ T9123] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.768248][ T9123] device bridge_slave_1 entered promiscuous mode [ 241.920670][ T9123] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 03:17:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8}]}, 0x58}}, 0x0) [ 241.963353][ T9123] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 242.073275][ T9123] team0: Port device team_slave_0 added [ 242.087990][ T9123] team0: Port device team_slave_1 added [ 242.144409][ T9285] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 242.164070][ T9285] device bridge1 entered promiscuous mode [ 242.211314][ T9123] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 242.219938][ T9123] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 242.247594][ T9123] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 03:17:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8}]}, 0x58}}, 0x0) [ 242.322316][ T9123] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 242.329694][ T9123] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 242.359385][ T9123] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 242.623510][ T9123] device hsr_slave_0 entered promiscuous mode [ 242.708501][ T9123] device hsr_slave_1 entered promiscuous mode [ 242.838086][ T9123] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 242.846462][ T9123] Cannot create hsr debugfs directory [ 242.853135][ T9310] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:17:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8}]}, 0x58}}, 0x0) [ 243.289255][ T9333] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:17:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 243.653194][ T9365] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 243.673140][ T9365] device bridge2 entered promiscuous mode [ 243.685792][ T9123] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 243.762315][ T9123] netdevsim netdevsim1 netdevsim1: renamed from eth1 03:17:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 243.819917][ T9123] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 243.888276][ T9123] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 243.948271][ T9371] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 243.988759][ T9371] device bridge3 entered promiscuous mode 03:17:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 244.253245][ T9123] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.279758][ T9380] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 244.321741][ T9380] device bridge4 entered promiscuous mode [ 244.360161][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.370375][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.407710][ T9123] 8021q: adding VLAN 0 to HW filter on device team0 03:17:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) [ 244.443731][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.453922][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.463699][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.471130][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.530937][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.541434][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 244.551607][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.561182][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.568640][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.577996][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.589160][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.600360][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 244.611650][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.666374][ T9123] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 244.678073][ T9123] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 244.752609][ T9123] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 244.761170][ T9388] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 244.927494][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 244.937838][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 244.956534][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.967294][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 244.977375][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 244.988200][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 244.998372][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.008509][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 245.016455][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 03:17:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) [ 245.218647][ T9123] device veth0_vlan entered promiscuous mode [ 245.229003][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.238915][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 245.249468][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 245.261146][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 245.271058][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.291848][ T9392] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 245.397147][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.406693][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 245.436755][ T9123] device veth1_vlan entered promiscuous mode [ 245.540629][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 245.551002][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 245.576441][ T9123] device veth0_macvtap entered promiscuous mode [ 245.602540][ T9123] device veth1_macvtap entered promiscuous mode [ 245.670035][ T9123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.680847][ T9123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.696422][ T9123] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 245.709006][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 245.719706][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 245.729264][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 245.739729][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 245.786317][ T9123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 245.799645][ T9123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.814324][ T9123] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 245.824556][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 245.835514][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:17:45 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) close(r0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xe) 03:17:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) [ 246.666251][ T9427] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:17:46 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x64010100}, 0x10) listen(r0, 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000140), 0x4) 03:17:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) 03:17:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) 03:17:46 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000000)={0x0, 0x0, "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"}) 03:17:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) 03:17:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8}]}, 0x58}}, 0x0) [ 247.555830][ T9459] 8021q: VLANs not supported on ipvlan0 03:17:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) [ 247.782060][ T9463] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 247.803016][ T9463] device bridge1 entered promiscuous mode [ 247.815270][ T9465] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:17:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) 03:17:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) [ 248.281707][ T9474] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 248.305316][ T9474] device macsec0 entered promiscuous mode [ 248.507824][ T9478] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 248.542232][ T9478] device team0 entered promiscuous mode [ 248.548266][ T9478] device team_slave_0 entered promiscuous mode [ 248.555318][ T9478] device team_slave_1 entered promiscuous mode 03:17:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) 03:17:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) [ 248.824267][ T9484] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 249.069439][ T9484] device netdevsim0 entered promiscuous mode [ 249.234933][ T9489] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 249.245536][ T9489] device caif0 entered promiscuous mode 03:17:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:17:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) [ 249.519627][ T9497] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 249.562464][ T9497] device vxcan1 entered promiscuous mode [ 249.700788][ T9495] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:17:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) 03:17:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 250.074338][ T9516] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:17:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') recvmmsg(r3, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r4, 0x111, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r4, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x2000cc00) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) setuid(r6) connect$pppoe(r1, &(0x7f00000000c0)={0x18, 0x0, {0x3, @dev={[], 0xfc}, 'geneve1\x00'}}, 0x1e) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e00000010008108040f80ecdb4cb9c00a480e180f000000e8bd6efb120015000e000100400000ff050005001200", 0x2e}], 0x1}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) fchown(r3, r8, 0xffffffffffffffff) 03:17:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 250.441454][ T9524] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:17:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:17:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') recvmmsg(r3, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r4, 0x111, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r4, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x2000cc00) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) setuid(r6) connect$pppoe(r1, &(0x7f00000000c0)={0x18, 0x0, {0x3, @dev={[], 0xfc}, 'geneve1\x00'}}, 0x1e) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e00000010008108040f80ecdb4cb9c00a480e180f000000e8bd6efb120015000e000100400000ff050005001200", 0x2e}], 0x1}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) fchown(r3, r8, 0xffffffffffffffff) [ 250.863885][ T9533] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:17:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:17:50 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000440)={0x49, ""/73}) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f00000000c0)={0x3}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) accept4$unix(r2, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x81000) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="023c517fd1a52a9e54e7fab981023a7f38d4d8b7c8b341f308dfd6885cf7d0272bb9121c8d2f80f2969cdf610e6c4ab897ddd5f9efe5a095e1187a93c3c2d828c33874d365dcff93288ad3c01b468455501d5d1e44b3ca7f847ce0e578b382fd5247e1ed856f439df8cc5b84e0f06515ce92db28a25e78e0199201b22439e1067cde02e843fcbdffc477438b5f8a6c5612260ef83b1965eb2b2dda1254ebf39d624f3b66aa73788cfca64797ed8157bdb8a914e157be2254e51e857471b1f5f5a190bb7fff20fb7719eca99801e773d31dc1c4a8c0cb095207cd023737dbc87d5d8508f1252df9084e76d75e0c8b0f62113b", 0xf2}, {&(0x7f0000000240)="b5b4de414d32106f42c11e5dd014af3c1e7ebf36dbb91b887a6d027204ae297c4119e7f5a9ca3defb631a5fd2d6f5fba28f30f40effc69e3c9d91acc6e573eb50ac3d09770cbcd497c21121f9123dedba6760de80f54f7ecdad14d44948d14aa2007b7025f84a59cc6c23cde340f9a9e2f8b26c80909a7e1740c83c1ce825e93fda35cc3b009a5e7923dc3f198af406399240cb31e99fca512ec7ff7d36e02981c2edd8d8803e030554cbb8bc7c7b4d17bfcb07d4f5031a7c5cce4ec5f8b3b0d77ca09da0cb9e217", 0xc8}], 0x2, 0x6) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_BUFS(r3, 0xc0186416, &(0x7f0000000340)={0xd427, 0x8c86, 0x0, 0xfffffc05, 0x0, 0x7}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r4 = open(&(0x7f0000000280)='.\x00', 0x80800, 0xc5) name_to_handle_at(r4, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) setns(r4, 0x20000000) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r5, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) getsockname(r5, &(0x7f00000004c0)=@ax25={{0x3, @null}, [@rose, @netrom, @remote, @rose, @null, @null, @remote, @netrom]}, &(0x7f0000000540)=0x80) r6 = socket(0x10, 0x2, 0x0) write(r6, &(0x7f0000000100)="240000005a001f000307f4f9002304000a04f51108000100020100020800038005000000", 0x24) [ 251.228989][ T9542] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:17:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000700)={r5, @in={{0x2, 0x0, @multicast1}}}, &(0x7f00000007c0)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000280)={r5, 0xb5, "c390a912312fec266120d6542f5f142f16a155fefe49c7b8450904663480d3b6ec48265ed6d579cbdbcae0237c0cd5f228d13a185c91c28462781a72adf18fcc608e6052421884ac79f103ad073fd662660afd2887016489d8691f388085d8c1ed334a152aa7ad055847cb5932fa3a097ccc69cf358329ad639e754bbb203d6b4e9f58dd4d6ad93b110fd045bc7c161e0574f097dbcd8b34e6b07a41381642f68de040af46fb838ccd2aa9411adc45b281698e60a5"}, &(0x7f0000000000)=0xbd) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)={r5, 0x5e, "640e7917abc76f0788cbf337002efc1497436f8cec0fca122e15bffdfa738d8e2c82be7da5d059e657e15c8191edc2c830d4d5a1afb12b2693b2a572ba2b07b89f1d2afa61f2b87aa80b730a413c266b06f7becc8410eacce0e7b5e0b10a"}, &(0x7f0000000100)=0x66) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000700)={r8, @in={{0x2, 0x0, @multicast1}}}, &(0x7f00000007c0)=0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r8, 0x1}, 0xffffff48) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f00000001c0)={@void, @val={0x5, 0x0, 0x0, 0x0, 0x7e}, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x84, 0x0, @remote, @remote}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "f426e6", 0x2, '\a\x00E'}, "8cbfc12a04282c27820fd9118600820e0006000600000000940a5a17e89fb5f1d3debc8540002b4ef424297d1138b27a369d0b112b33df4c366b67856c210a24c3df6373d0ca47c3c2885da770edbd1ee5bde967a600000000000000"}}}}, 0x8a) 03:17:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 251.805920][ T9554] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:17:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:17:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e22, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, {0xa, 0x4e20, 0x5, @remote, 0x7}, 0x6, [0x0, 0x80, 0x3fc, 0x8000, 0x2, 0x0, 0xdf8, 0xfffffc00]}, 0x5c) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0185648, &(0x7f0000000100)={0x4, 0xffffa742, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x980913, 0x0, [], @value=0xff}}) getsockname$tipc(r1, &(0x7f0000000140), &(0x7f0000000180)=0x10) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000200)=0xfff, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x4}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x1d}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2={0xfc, 0x2, [], 0x1}}]}, 0x40}, 0x1, 0x0, 0x0, 0x40010}, 0x8040) r4 = openat$vnet(0xffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af04, &(0x7f0000000400)=&(0x7f00000003c0)) r5 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0x3, 0x80043) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000480)={r0, r0, 0x4, r5}, 0x10) r6 = openat$vicodec1(0xffffff9c, &(0x7f00000004c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r6, 0xc040563e, &(0x7f0000000500)={0x0, 0x0, 0x2, 0x1, {0x3f, 0x4, 0x5, 0x1}}) r7 = accept4$bt_l2cap(r1, &(0x7f0000000540), &(0x7f0000000580)=0xe, 0x800) ioctl$FS_IOC_GETFLAGS(r7, 0x80046601, &(0x7f00000005c0)) r8 = openat$btrfs_control(0xffffff9c, &(0x7f0000000600)='/dev/btrfs-control\x00', 0x224443, 0x0) sendmsg$can_bcm(r8, &(0x7f0000000700)={&(0x7f0000000640), 0x10, &(0x7f00000006c0)={&(0x7f0000000680)={0x4, 0x20, 0x6, {}, {0x77359400}, {0x2, 0x0, 0x0, 0x1}, 0x1, @can={{0x4, 0x0, 0x1, 0x1}, 0x5, 0x3b32a18be15f8000, 0x0, 0x0, "f5f78b3fec136fde"}}, 0x34}}, 0x20050000) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000780)='security.evm\x00', &(0x7f00000007c0)=@md5={0x1, "0f4a4a5d932ee6466360105b4e4dc374"}, 0x11, 0x1) [ 252.347337][ T9566] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 252.367570][ T9566] device bridge5 entered promiscuous mode 03:17:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x2) 03:17:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 252.657244][ T9577] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 252.676862][ T9577] device bridge6 entered promiscuous mode 03:17:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x2) 03:17:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:17:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x2) [ 253.050227][ T9590] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 253.070107][ T9590] device bridge7 entered promiscuous mode [ 253.074918][ T9587] IPVS: ftp: loaded support on port[0] = 21 03:17:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:17:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x2) [ 253.476294][ T9621] device bridge8 entered promiscuous mode 03:17:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:17:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) [ 253.755559][ T9587] chnl_net:caif_netlink_parms(): no params data found [ 253.897594][ T9714] device bridge9 entered promiscuous mode 03:17:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) 03:17:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 254.195302][ T9740] device bridge10 entered promiscuous mode [ 254.212719][ T9587] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.221433][ T9587] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.231658][ T9587] device bridge_slave_0 entered promiscuous mode [ 254.326361][ T9587] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.333811][ T9587] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.343759][ T9587] device bridge_slave_1 entered promiscuous mode [ 254.414741][ T9587] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.431970][ T9587] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.505039][ T9587] team0: Port device team_slave_0 added [ 254.519938][ T9587] team0: Port device team_slave_1 added [ 254.578516][ T9587] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 254.585593][ T9587] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.614809][ T9587] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 254.641307][ T9587] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 254.649815][ T9587] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.677494][ T9587] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 254.925908][ T9587] device hsr_slave_0 entered promiscuous mode [ 255.058518][ T9587] device hsr_slave_1 entered promiscuous mode [ 255.179969][ T9587] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 255.187851][ T9587] Cannot create hsr debugfs directory [ 255.501373][ T9587] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 255.539049][ T9587] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 255.597444][ T9587] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 255.829772][ T9587] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 256.214500][ T9587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.270461][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.279869][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.305655][ T9587] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.334062][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.345108][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.354794][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.362258][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.378967][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.393904][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.404175][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.414260][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.421644][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.470842][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.482621][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.494108][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.505325][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.516157][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.527332][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.544105][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 256.566306][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.576565][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.609060][ T9587] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 256.623717][ T9587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 256.641786][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.652549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.710273][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 256.718238][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.760413][ T9587] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 256.817698][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 256.828711][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 256.891862][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 256.902829][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.928082][ T9587] device veth0_vlan entered promiscuous mode [ 256.938959][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.948552][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.988944][ T9587] device veth1_vlan entered promiscuous mode [ 257.059856][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 257.070000][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 257.080141][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.090667][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.115729][ T9587] device veth0_macvtap entered promiscuous mode [ 257.136383][ T9587] device veth1_macvtap entered promiscuous mode [ 257.198367][ T9587] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.209121][ T9587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.219297][ T9587] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.229968][ T9587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.245627][ T9587] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 257.255330][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 257.265282][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.275202][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.285658][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.314144][ T9587] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.325509][ T9587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.335602][ T9587] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.346240][ T9587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.361122][ T9587] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 257.369459][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.379957][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:17:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x2, &(0x7f0000000280)=[{}, {0x6}]}) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f00000000c0)={0x3}) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f00000000c0)={0x3}) fcntl$dupfd(r1, 0x406, r2) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f00000000c0)={0x3}) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f0000000080)={0x3, 0x3, 0x2}) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000040)={{0x4, @name="160f920de1df4a61bf8a57196725d58064e942f520046d5686dc891102bacbf6"}, 0x8, 0x6, 0xffff}) 03:17:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:17:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 258.362984][ T9854] __nla_validate_parse: 3 callbacks suppressed [ 258.363018][ T9854] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 258.390001][ T9854] device bridge11 entered promiscuous mode 03:17:57 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:17:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:17:58 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 258.911759][ T9868] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 258.934107][ T9868] device bridge12 entered promiscuous mode 03:17:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:17:58 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 259.279278][ T9877] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 259.304369][ T32] audit: type=1326 audit(1588735078.579:9): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9860 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7fd0d99 code=0x0 [ 259.322382][ T9877] device bridge13 entered promiscuous mode 03:17:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 259.416491][ T32] audit: type=1326 audit(1588735078.619:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9860 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7fd0d99 code=0x0 03:17:58 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, 0x7fff) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f00000000c0)={0x3}) dup3(r1, r0, 0x80000) 03:17:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 259.604835][ T9888] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:17:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x21, r1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0x3, 0x4, 0x401, 0x7fffffff, 'syz1\x00', 0x8}, 0x5, 0x4, 0x9, r1, 0xa, 0x100, 'syz1\x00', &(0x7f0000000080)=[']\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', '\x00', '/dev/ttyS3\x00', '{mime_type{]\'\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', 'vboxnet0)nodev\'.vboxnet0\x00', '/dev/ttyS3\x00'], 0x6c, [], [0xc69, 0x20, 0x5, 0x1]}) eventfd2(0x3, 0x1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) 03:17:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 259.842962][ T9897] IPVS: ftp: loaded support on port[0] = 21 03:17:59 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 259.983044][ T9903] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:17:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 260.265718][ T9908] IPVS: ftp: loaded support on port[0] = 21 03:17:59 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x21, r1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0x3, 0x4, 0x401, 0x7fffffff, 'syz1\x00', 0x8}, 0x5, 0x4, 0x9, r1, 0xa, 0x100, 'syz1\x00', &(0x7f0000000080)=[']\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', '\x00', '/dev/ttyS3\x00', '{mime_type{]\'\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', 'vboxnet0)nodev\'.vboxnet0\x00', '/dev/ttyS3\x00'], 0x6c, [], [0xc69, 0x20, 0x5, 0x1]}) eventfd2(0x3, 0x1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) 03:17:59 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 260.529278][ T9932] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 260.622320][ T9948] IPVS: ftp: loaded support on port[0] = 21 03:17:59 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:18:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8}]}, 0x58}}, 0x0) [ 261.004826][ T9988] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) 03:18:00 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x21, r1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0x3, 0x4, 0x401, 0x7fffffff, 'syz1\x00', 0x8}, 0x5, 0x4, 0x9, r1, 0xa, 0x100, 'syz1\x00', &(0x7f0000000080)=[']\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', '\x00', '/dev/ttyS3\x00', '{mime_type{]\'\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', 'vboxnet0)nodev\'.vboxnet0\x00', '/dev/ttyS3\x00'], 0x6c, [], [0xc69, 0x20, 0x5, 0x1]}) eventfd2(0x3, 0x1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) 03:18:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8}]}, 0x58}}, 0x0) 03:18:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) [ 261.328938][ T9996] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 261.390068][ T9997] IPVS: ftp: loaded support on port[0] = 21 03:18:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8}]}, 0x58}}, 0x0) 03:18:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) [ 261.744805][T10026] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x21, r1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0x3, 0x4, 0x401, 0x7fffffff, 'syz1\x00', 0x8}, 0x5, 0x4, 0x9, r1, 0xa, 0x100, 'syz1\x00', &(0x7f0000000080)=[']\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', '\x00', '/dev/ttyS3\x00', '{mime_type{]\'\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', 'vboxnet0)nodev\'.vboxnet0\x00', '/dev/ttyS3\x00'], 0x6c, [], [0xc69, 0x20, 0x5, 0x1]}) eventfd2(0x3, 0x1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) 03:18:01 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:18:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 262.074740][T10033] IPVS: ftp: loaded support on port[0] = 21 [ 262.217252][T10044] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b2907420000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000277dbcd04f41951c1d880000ff00"/120], 0x78) 03:18:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:01 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x21, r1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0x3, 0x4, 0x401, 0x7fffffff, 'syz1\x00', 0x8}, 0x5, 0x4, 0x9, r1, 0xa, 0x100, 'syz1\x00', &(0x7f0000000080)=[']\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', '\x00', '/dev/ttyS3\x00', '{mime_type{]\'\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', 'vboxnet0)nodev\'.vboxnet0\x00', '/dev/ttyS3\x00'], 0x6c, [], [0xc69, 0x20, 0x5, 0x1]}) eventfd2(0x3, 0x1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 03:18:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000180)={0x0, 0x0, "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"}) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 262.697583][T10074] IPVS: ftp: loaded support on port[0] = 21 03:18:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x8}, [{0x0, 0x0, 0x0, 0x401}]}, 0x78) 03:18:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000740)="b8", 0x1, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000400)='asymmetric\x00', &(0x7f0000000700)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xffffffffffffffff, r2, 0x0) keyctl$revoke(0x3, r1) 03:18:02 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x21, r1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0x3, 0x4, 0x401, 0x7fffffff, 'syz1\x00', 0x8}, 0x5, 0x4, 0x9, r1, 0xa, 0x100, 'syz1\x00', &(0x7f0000000080)=[']\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', '\x00', '/dev/ttyS3\x00', '{mime_type{]\'\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', 'vboxnet0)nodev\'.vboxnet0\x00', '/dev/ttyS3\x00'], 0x6c, [], [0xc69, 0x20, 0x5, 0x1]}) eventfd2(0x3, 0x1) 03:18:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) 03:18:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000700)={r5, @in={{0x2, 0x0, @multicast1}}}, &(0x7f00000007c0)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000000)={0x7, 0x0, 0x8, 0x3a5054a0, r5}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0xcb, 0x1, 0x3, 0x0, 0x55acecac, 0x8, 0x9, 0x3, r6}, &(0x7f00000000c0)=0xffac) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b29074200000000000000000000000000000000000000000000000000000000400000000000000000130000000000000000000000003800"/120], 0x78) [ 263.434767][T10112] IPVS: ftp: loaded support on port[0] = 21 03:18:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) 03:18:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x8000000000000}], "56d7ca6856249804e35a1c5d104319dfc0b98679ce88eae6131745c919a09a88d76bcfd0a27f9c4e50a4e94f91", [[], [], [], [], [], [], [], [], [], []]}, 0xaa5) 03:18:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) 03:18:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x21, r1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0x3, 0x4, 0x401, 0x7fffffff, 'syz1\x00', 0x8}, 0x5, 0x4, 0x9, r1, 0xa, 0x100, 'syz1\x00', &(0x7f0000000080)=[']\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', '\x00', '/dev/ttyS3\x00', '{mime_type{]\'\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', 'vboxnet0)nodev\'.vboxnet0\x00', '/dev/ttyS3\x00'], 0x6c, [], [0xc69, 0x20, 0x5, 0x1]}) 03:18:03 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000080)=[{{r1, r2/1000+60000}, 0x1, 0x91e, 0x1f0d}, {{0x77359400}, 0x1, 0x8001, 0x2}, {{}, 0x5, 0xffff, 0x3}, {{r3, r4/1000+60000}, 0x12, 0x2, 0x1}], 0x40) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r5, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:18:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 264.126836][T10151] IPVS: ftp: loaded support on port[0] = 21 03:18:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000000)={0xde32, 0x5, 0x1, 0x2, 0x4, 0x1}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b2907420000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000040380000000000e644993290571405c754b6d6400000000000000000000000000000000000000000000000220819de0addf2da85000000000000001000"/136], 0x78) 03:18:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b290742000000000000e10000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000be433a3d116f1f86000000000000000000000000000000000000000000000000000000000000000000000029105351db6491900c981f26be4f46bf7e941bc8825b0a799d6df3524841edd7f5f213d6c308dd26bbc9299e24a8144d9599180c2cbae89efb653ee8ec7cc527671620e613ec5f87d8ece8d1b6"], 0x78) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) 03:18:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x21, r1, 0x0, 0x0) 03:18:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x8000, 0x21b, 0x40, 0x0, 0x0, 0x3, 0x38, 0x0, 0x0, 0x400, 0xfffc}, [{0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, 0x78) [ 264.667562][T10189] IPVS: ftp: loaded support on port[0] = 21 03:18:04 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) 03:18:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:04 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) 03:18:04 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x21, r1, 0x0, 0x0) [ 265.214837][T10223] IPVS: ftp: loaded support on port[0] = 21 03:18:04 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:18:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) getpid() 03:18:05 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f00000000c0)={0x3}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f00000000c0)={0x3}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x78) 03:18:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 265.918264][T10260] IPVS: ftp: loaded support on port[0] = 21 03:18:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 03:18:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000180)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2bf, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0xfffd}, [{}], "", [[]]}, 0x178) 03:18:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 266.300887][T10291] IPVS: ftp: loaded support on port[0] = 21 03:18:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40, 0xffffffffffffffff}, [{0x5, 0x6, 0x3, 0x39a86458, 0x8, 0x80, 0x7fff, 0x8}, {0x2, 0x3, 0x5, 0x8, 0x10000, 0xffffffffffffffff, 0x4, 0x8001}]}, 0xb0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x6, 0x1}, {0x0, 0x6}, {0x80, 0x3}]}) [ 266.411158][T10290] IPVS: ftp: loaded support on port[0] = 21 03:18:06 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) 03:18:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 266.928312][T10343] IPVS: ftp: loaded support on port[0] = 21 [ 267.476560][T10290] chnl_net:caif_netlink_parms(): no params data found [ 267.743094][T10290] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.750763][T10290] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.760780][T10290] device bridge_slave_0 entered promiscuous mode [ 267.780530][T10290] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.790058][T10290] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.800311][T10290] device bridge_slave_1 entered promiscuous mode [ 267.869233][T10290] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 267.886558][T10290] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 267.944587][T10290] team0: Port device team_slave_0 added [ 267.958812][T10290] team0: Port device team_slave_1 added [ 268.011354][T10290] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 268.018555][T10290] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.045084][T10290] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 268.065195][T10290] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 268.072812][T10290] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.099279][T10290] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 268.195919][T10290] device hsr_slave_0 entered promiscuous mode [ 268.268311][T10290] device hsr_slave_1 entered promiscuous mode [ 268.377251][T10290] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 268.384905][T10290] Cannot create hsr debugfs directory [ 268.783354][T10290] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 268.852746][T10290] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 268.956032][T10290] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 269.040434][T10290] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 269.445679][T10290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 269.492033][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.501737][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.525699][T10290] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.556154][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.567681][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.577783][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.585040][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.599831][ T31] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.628481][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.644358][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.654150][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.661624][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.718137][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 269.730484][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 269.741826][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 269.753561][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 269.802780][T10290] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 269.815381][T10290] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 269.836197][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 269.847330][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 269.858517][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.872132][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 269.882373][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.893310][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 269.903646][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.920404][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 269.985615][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 269.994468][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.030565][T10290] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 270.108844][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 270.119357][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.188634][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 270.198738][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.233220][T10290] device veth0_vlan entered promiscuous mode [ 270.243898][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.254494][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.306418][T10290] device veth1_vlan entered promiscuous mode [ 270.397900][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 270.408565][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 270.418829][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.429715][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.460213][T10290] device veth0_macvtap entered promiscuous mode [ 270.485765][T10290] device veth1_macvtap entered promiscuous mode [ 270.505275][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 270.515948][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.566749][T10290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.578132][T10290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.588564][T10290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.599321][T10290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.609604][T10290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.621257][T10290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.638084][T10290] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 270.648647][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.659878][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.701457][T10290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 270.714240][T10290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.724535][T10290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 270.735463][T10290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.746127][T10290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 270.756836][T10290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.772173][T10290] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 270.787537][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.798497][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.520388][T10575] IPVS: ftp: loaded support on port[0] = 21 03:18:10 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x21, r1, 0x0, 0x0) 03:18:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat$ipvs(0xffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 03:18:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:10 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) [ 271.880075][T10603] IPVS: ftp: loaded support on port[0] = 21 03:18:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:11 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000080)=0xffffffff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000180)=""/220) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f00000000c0)={0x3}) dup(r3) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="1b29074200000000000000000000000000000000000000000000000000000000400000000000000000919feda5da5a4215deac8fb15de82a000000000000000000000000003800"/120], 0x78) 03:18:11 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 272.166425][T10629] IPVS: ftp: loaded support on port[0] = 21 03:18:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x21, r1, 0x0, 0x0) [ 272.535679][T10660] IPVS: ftp: loaded support on port[0] = 21 03:18:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) [ 272.778312][T10668] IPVS: ftp: loaded support on port[0] = 21 [ 272.855603][T10686] __nla_validate_parse: 2 callbacks suppressed [ 272.855755][T10686] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:12 executing program 2: clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 273.225544][T10713] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) 03:18:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 273.383576][T10717] IPVS: ftp: loaded support on port[0] = 21 [ 273.624487][T10727] IPVS: ftp: loaded support on port[0] = 21 [ 273.638473][T10721] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:13 executing program 2: clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 274.071322][T10771] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 274.113904][T10773] IPVS: ftp: loaded support on port[0] = 21 03:18:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:13 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) [ 274.479444][T10790] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 274.560641][T10795] IPVS: ftp: loaded support on port[0] = 21 03:18:13 executing program 2: clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 274.910949][T10825] IPVS: ftp: loaded support on port[0] = 21 [ 274.973883][T10827] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) 03:18:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 275.198333][T10842] IPVS: ftp: loaded support on port[0] = 21 03:18:14 executing program 2: set_mempolicy(0x0, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 275.481761][T10871] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 275.690122][T10880] IPVS: ftp: loaded support on port[0] = 21 [ 275.912858][T10899] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 275.952379][T10906] IPVS: ftp: loaded support on port[0] = 21 03:18:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:15 executing program 2: set_mempolicy(0x0, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 276.300571][T10920] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:15 executing program 3: clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c00010062"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 276.551186][T10934] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 276.645489][T10939] IPVS: ftp: loaded support on port[0] = 21 [ 276.710717][T10941] IPVS: ftp: loaded support on port[0] = 21 03:18:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c00010062"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:16 executing program 2: set_mempolicy(0x0, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c00010062"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:16 executing program 3: clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 277.387964][T10992] IPVS: ftp: loaded support on port[0] = 21 [ 277.504699][T10996] IPVS: ftp: loaded support on port[0] = 21 03:18:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c00010062726964"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:17 executing program 2: set_mempolicy(0x3, 0x0, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 277.993410][T11044] __nla_validate_parse: 2 callbacks suppressed [ 277.993442][T11044] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 278.095221][T11048] IPVS: ftp: loaded support on port[0] = 21 03:18:17 executing program 3: clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c00010062726964"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:17 executing program 2: set_mempolicy(0x3, 0x0, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 278.424864][T11067] IPVS: ftp: loaded support on port[0] = 21 [ 278.578336][T11075] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:17 executing program 3: set_mempolicy(0x0, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c00010062726964"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 278.751936][T11100] IPVS: ftp: loaded support on port[0] = 21 [ 278.937019][T11106] IPVS: ftp: loaded support on port[0] = 21 [ 278.976196][T11111] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:18 executing program 2: set_mempolicy(0x3, 0x0, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c0001006272696467"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 279.426843][T11153] IPVS: ftp: loaded support on port[0] = 21 03:18:18 executing program 3: set_mempolicy(0x0, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 279.622747][T11156] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 279.752904][T11180] IPVS: ftp: loaded support on port[0] = 21 03:18:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c0001006272696467"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000040), 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 280.170963][T11206] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 280.253832][T11210] IPVS: ftp: loaded support on port[0] = 21 03:18:19 executing program 3: set_mempolicy(0x0, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c0001006272696467"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 280.651168][T11236] IPVS: ftp: loaded support on port[0] = 21 [ 280.746061][T11238] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:20 executing program 2: set_mempolicy(0x3, &(0x7f0000000040), 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:20 executing program 4: set_mempolicy(0x3, &(0x7f0000000040), 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:20 executing program 3: set_mempolicy(0x3, 0x0, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 281.158644][T11267] IPVS: ftp: loaded support on port[0] = 21 03:18:20 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000840)=0x1, 0x4) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b29074200000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008df35b9f62d044267fac84dbe83031e553855ff6b060de345c7137c1759ce72d2af8d490b88ef104326720669235358dbb49ad88cd831a08aac03844a4bc6a"], 0x78) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x44) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f00000000c0)={0x11}) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r3, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000800)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)={0x5dc, r4, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xbc}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e22}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b='\xb0\x80s\xe8\xd4N\x91\xe3\xda\x92,\"C\x82D\xbb\x88\\i\xe2i\xc8\xe9\xd85\xb1\x14):M\xdcn'}, @WGDEVICE_A_PEERS={0x55c, 0x8, 0x0, 0x1, [{0x558, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x2}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}, @WGPEER_A_ALLOWEDIPS={0x39c, 0x9, 0x0, 0x1, [{0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @local}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x42}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x1b}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_ALLOWEDIPS={0x108, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x1000}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "bc4347034e2500b375f7f8787489d1f43af6113889438c134121076e772ebbbd"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "476f546aa1f33e69bd4561e3de5a28c9f3080b499f37f8340978a850c9a0bb56"}, @WGPEER_A_FLAGS={0x8, 0x3, 0x7}]}]}, @WGDEVICE_A_FLAGS={0x8}]}, 0x5dc}, 0x1, 0x0, 0x0, 0x4000}, 0x4008800) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000880)={"92b72df38669c1d2b872c540bee6815c035b940f5569d98423ccc10c56b53bf328e663e291bfde9fff601f1284ca85b85cc4b3a8a8c43d8a9d393fb3b339b73af513c072ddb5d9f49d1df4a506b4e2add3f8c64ec0c800a6222adceb9ba056709182590aefb2f279cf876c8bbf102481a2f2c04f4131796fb8afe6c6dcd3d0f1b5cac899c69d6e07da73467d29f425167de32315bf4d753752d714f32bc05dab771f1a832421df42d32c8b766c2c1ee6e34a8ad718fc54d48afb18614197ccf99e743c295dc7d50098bd74484a11e67a4ed1bf366e6611db0d1b3f38d4152f31e9915818553b7dac1845dda48a894d04b45a9f6c1d5d939b5e820c0368145dcfce96a3a73365fbb27a7bf6b6af23622e445c03670c388a5919b67f501af9b91a1d0ff0bc7104fa9e52b454016ebc6b133b4069df3d5ea153f6fd1f317990a5dce468dadd06449cd5bf66ba9492efa020112b8da4536956885bdef7db47b6c2d98b1253181d26d64e6c05d2ad0ecbb446c00986416b45f6431683c91098011b7cea9feb3f492b27fef77c52a189e56205d780888d6b6c819471c3d5836c78538e70f25a61f7e72f8ccb4a98c40249c9cbb6f89963efb70db421dfdfe74f444330581d6f89a445965be4071ec75e5d259991c5092b0dfacd765ae985632031ed228c1e491ac45d60df1cb005824fe5f2d6fc96d45e93fd8c951e2a30aaba75acd4f2fb92d9449fcf11d7c31015d188ee2c76a37db32c01b4179a2567130f3ed038afe84e2ca2d2a471a9f8e0dd12bd12d7b206cdce65530dd2376c6992df0afdb0a5659bebfcbb01e6ee6663037ba5f7699727256c113db9b4fd98946175641433d83e1e140d143b0ffa211eb5c1c912c5342021a982f6abf91a2d12286349bedc2c23ec170149e4f5a335954ddb1dba77419e47940386b5c538363005db401f571898f2654345601eb26669dc384f25268636401b2af88e52b7a836336558ba5a4d0f038916e230dd3b8e6a9ff874c6e623186cb0bb1eb54e0bcacdfb9b2e4fdb63595ecfc97b02a7eaa166af5845476a06b03309673a94b2b631a43042ac906af61619f87f724060c1aaa09cd6d85b901f7dd3aad698745a0cf02452ad9d828da0b3ccda7a02014cd50e6eb125f5b81f0a6e1ebd93b3aeb18ce931b4f341effb690b1e2309e20025171411f31b2d0fb10b45d2b94990576068fb69cb17d974c5003ace59d20df03430f34f4384d7925890dba62b4c986e55c5797139ae7ae32fd524dc92ae7c95fdae6f2e80e5ce5cfa1c96032976a29cdbf3c2660edd80fa9ee01c7c4ed9a05c752bf2cbc3f57c613183a63c45cf99cdbcfda942b092fa28b139da4f5e420046fa57895544fe199e7a64d4516ece0c254660049f03a113f0b0850f58b5dbe21caccb5d6c57e0fd34275bebe7c93c4a0f746bc025d327abd3b8"}) [ 281.252712][T11269] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 281.647632][T11299] IPVS: ftp: loaded support on port[0] = 21 03:18:21 executing program 2: set_mempolicy(0x3, &(0x7f0000000040), 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 281.762611][T11302] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 282.110685][T11320] IPVS: ftp: loaded support on port[0] = 21 03:18:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000280)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x9c, r3, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6erspan0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ipvlan0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40040}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:18:21 executing program 3: set_mempolicy(0x3, 0x0, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 282.607886][T11353] IPVS: ftp: loaded support on port[0] = 21 03:18:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x44, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x38, r4, 0x2, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x4}}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x804}, 0x4) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 282.648935][T11330] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:22 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x0) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 282.943365][T11359] IPVS: ftp: loaded support on port[0] = 21 [ 283.093038][T11386] IPVS: ftp: loaded support on port[0] = 21 [ 283.225517][T11394] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 283.914289][T11359] chnl_net:caif_netlink_parms(): no params data found [ 284.105271][T11359] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.113022][T11359] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.125970][T11359] device bridge_slave_0 entered promiscuous mode [ 284.148306][T11359] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.155576][T11359] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.167653][T11359] device bridge_slave_1 entered promiscuous mode [ 284.262165][T11359] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 284.282069][T11359] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 284.343286][T11359] team0: Port device team_slave_0 added [ 284.364067][T11359] team0: Port device team_slave_1 added [ 284.416399][T11359] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 284.423564][T11359] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 284.451065][T11359] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 284.471386][T11359] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 284.479785][T11359] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 284.506120][T11359] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 284.606136][T11359] device hsr_slave_0 entered promiscuous mode [ 284.659171][T11359] device hsr_slave_1 entered promiscuous mode [ 284.727099][T11359] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 284.734760][T11359] Cannot create hsr debugfs directory [ 285.163268][T11359] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 285.217640][T11359] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 285.280365][T11359] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 285.350819][T11359] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 285.706448][T11359] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.772034][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.781436][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.809740][T11359] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.843465][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.855855][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.865940][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.873446][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.888920][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.913604][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.924948][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.935135][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.942477][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.012371][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 286.025126][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 286.037195][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 286.049918][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 286.065526][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 286.084819][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 286.096422][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 286.142535][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 286.153405][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.163497][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 286.173684][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.201895][T11359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 286.268135][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 286.276166][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 286.309072][T11359] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 286.506468][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.518434][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.604390][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.615988][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.641063][T11359] device veth0_vlan entered promiscuous mode [ 286.673754][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.683835][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.708268][T11359] device veth1_vlan entered promiscuous mode [ 286.780223][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 286.791046][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 286.828722][T11359] device veth0_macvtap entered promiscuous mode [ 286.842736][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 286.854257][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 286.875617][T11359] device veth1_macvtap entered promiscuous mode [ 286.894453][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 286.905070][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.964286][T11359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 286.978271][T11359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.988656][T11359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 287.000814][T11359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.011116][T11359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 287.021982][T11359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.032119][T11359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 287.045381][T11359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.061116][T11359] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 287.074320][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 287.085822][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 287.114241][T11359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 287.125295][T11359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.137010][T11359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 287.147934][T11359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.158725][T11359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 287.170235][T11359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.180977][T11359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 287.191921][T11359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.207242][T11359] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 287.217809][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 287.229460][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 287.970588][T11643] IPVS: ftp: loaded support on port[0] = 21 03:18:27 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x0) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:27 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x80000, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x401, 0x4) syz_open_dev$tty1(0xc, 0x4, 0x4) 03:18:27 executing program 3: set_mempolicy(0x3, 0x0, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:27 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x0) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 288.323132][T11668] IPVS: ftp: loaded support on port[0] = 21 [ 288.401080][T11676] IPVS: ftp: loaded support on port[0] = 21 [ 288.417811][T11677] IPVS: ftp: loaded support on port[0] = 21 03:18:27 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) write$midi(r0, &(0x7f0000000140)="f15cacaf09be254f00f1d12a1d08924eaeaf062ad802ac2c6a91a4307a2b1093e9f556ee44ec2190c1c786384ddb3de19c6eccd2ff77bc45a453343b2d4bb7708fcae96d64bef6d291f7d145e96ebfd5384ccddd84c762ed56d2e35c939c4fea7b44a605e4731d45e898af2fa41eb7d98a5db5443a0c6c863053b91dae5b628c767f7d3d179a78", 0x87) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000000), &(0x7f0000000080)=0xb0, 0x0) fcntl$addseals(r2, 0x409, 0x8) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xfffffffffffffffc, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1fb}}, 0x40) [ 288.498527][T11675] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:28 executing program 3: set_mempolicy(0x3, &(0x7f0000000040), 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:28 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x0) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:28 executing program 4: set_mempolicy(0x3, &(0x7f0000000040), 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:28 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b29074200000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000052e1390bcc8b640d045a0000000000000000000000000000000000000000000000000000000000000000080f000000000000000000000000000000fe72fa75defa622405ca49ff6c385d14430080146f0f4678e6bf279f2a9f9e18ee35670cff62bfd2c590b3b0748fe4f44828caec7539a113bf40c64daad192a586d2c6c6ece16691c85b71d9cb351704efc9f5450e76a21c10d635eaf926404de24dd736520d6ee8bf3362c4054093b988e8716a1f906430a3e464e1c2b8e12fa721573242d81401bb3903b10093e5d2b46b75995910eafc54d28ff453eace398ae7ef96bcc0f87834c94cf72c4eb8e452bf459cbe503f8f8159a1cfced874820529fa7759dab285f2c644cbc7d153a4a0309ae96d24df82ab2443104aa609309e3f05012889e0f405f8bf6b52947dc3a60b157e"], 0x78) [ 289.307892][T11751] IPVS: ftp: loaded support on port[0] = 21 [ 289.380576][T11752] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 289.409794][T11754] IPVS: ftp: loaded support on port[0] = 21 [ 289.563835][T11763] IPVS: ftp: loaded support on port[0] = 21 03:18:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000180)={0x8, 0x1, 0x9, 0x6, 0x6, "f900688e17a09711467488a370371e47984496", 0x8, 0x10000}) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r3, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) recvfrom$x25(r3, &(0x7f00000001c0)=""/118, 0x76, 0x40, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000040)={'broute\x00'}, &(0x7f00000000c0)=0x50) setxattr$security_capability(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300)=@v2={0x2000000, [{0xfffffffe, 0x9}, {0x4, 0xffffffff}]}, 0x14, 0x2) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 290.065083][T11805] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=11805 comm=syz-executor.0 03:18:29 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:18:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:29 executing program 4: set_mempolicy(0x0, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:18:30 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 291.510896][T11854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=11854 comm=syz-executor.0 [ 291.576433][T11858] IPVS: ftp: loaded support on port[0] = 21 03:18:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:31 executing program 3: set_mempolicy(0x3, &(0x7f0000000040), 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:31 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:18:31 executing program 4: set_mempolicy(0x0, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f00000000c0)={0x3}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x8e) [ 292.630862][T11894] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=11894 comm=syz-executor.0 [ 292.643534][T11896] IPVS: ftp: loaded support on port[0] = 21 03:18:32 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f00000000c0)={0x3}) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x5}, [], "", [[], []]}, 0x240) 03:18:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 292.900654][T11905] IPVS: ftp: loaded support on port[0] = 21 [ 293.151443][T11924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=11924 comm=syz-executor.0 03:18:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000040), 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:32 executing program 4: set_mempolicy(0x3, &(0x7f0000000040), 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [], "acc077d6590d0b161ca9287a7c52113c1916bb46272645bb199fde7a29ec061886e5d420ed750d6f693c7e42d17984fdd297576c5af7d95060683e16219895677cce1a2617ad08064837760f279b5a7217b0a06cc600816c5400af118ca9895e521cd53874b901a1158f4becfad28ae6aa41006206f0618da365564b1584d42cffc69630beffc8cac0fc66ae71d6614f3a393f3d66676c21be11e731c850f555a5726ce05b00dbba74790daf0e12e8e33f338fa13e5d7e5d5ef5b873a6d7a4671e4f1969987d1a2c911595db1fa9623664c791b51731bef03ef44eb55d4f6860a9f042bf6e7e5f7b786fb0f40a633770a96594cc3de22bf8d73c99822605"}, 0x13e) [ 293.673768][T11958] IPVS: ftp: loaded support on port[0] = 21 [ 293.678218][T11955] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=11955 comm=syz-executor.0 [ 293.864242][T11962] IPVS: ftp: loaded support on port[0] = 21 03:18:33 executing program 2: set_mempolicy(0x3, 0x0, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 03:18:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 294.057199][T11966] IPVS: ftp: loaded support on port[0] = 21 03:18:33 executing program 4: clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 294.428502][T12033] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=12033 comm=syz-executor.0 03:18:33 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x0) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:33 executing program 2: set_mempolicy(0x0, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:33 executing program 1: r0 = openat$bsg(0xffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x82000, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x3f7, 0x800, 0x70bd27, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20040800}, 0x4004000) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:18:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000100001040000", @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 294.663072][T12035] IPVS: ftp: loaded support on port[0] = 21 [ 294.737321][T12038] IPVS: ftp: loaded support on port[0] = 21 [ 295.007384][T12077] IPVS: ftp: loaded support on port[0] = 21 [ 295.122611][T12085] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:34 executing program 2: clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:34 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f00000000c0)={0x3}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f00000000c0)={0x3}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x78) 03:18:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000100001040000", @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:34 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) [ 295.516968][T12105] IPVS: ftp: loaded support on port[0] = 21 [ 295.637734][T12113] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:35 executing program 1: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x3) r0 = openat$vcs(0xffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20600, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x101, 0x8, 0x2, "333f0d182763a5af758d0c93fbcdf7563fe985a30eab778bd7d1c371e2a0a888", 0x38323151}) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "97ae564d8ad89a6317b3ad14dbd4c69349654e"}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], [], [], [], [], []]}, 0x678) [ 295.777457][ T38] tipc: TX() has been purged, node left! [ 295.863723][T12138] IPVS: ftp: loaded support on port[0] = 21 03:18:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000100001040000", @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x0) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x0) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 296.300672][T12161] IPVS: ftp: loaded support on port[0] = 21 03:18:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 296.348174][T12165] IPVS: ftp: loaded support on port[0] = 21 [ 296.434481][T12160] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400000000000000", @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:36 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) 03:18:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x1, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x8}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x20040814) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x2, 0x2, 0x801, 0x0, 0x0, {0x5, 0x0, 0x1}, [@CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x26008000}, 0x4040905) 03:18:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x0) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 03:18:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) [ 297.147733][T12224] IPVS: ftp: loaded support on port[0] = 21 [ 297.212384][T12223] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:36 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) getpid() 03:18:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400000000000000", @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) [ 297.558485][T12251] IPVS: ftp: loaded support on port[0] = 21 03:18:36 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2, @bcast, @netrom={'nr', 0x0}, 0x7, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 297.679543][T12256] IPVS: ftp: loaded support on port[0] = 21 [ 298.004134][T12279] IPVS: ftp: loaded support on port[0] = 21 03:18:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) [ 298.187695][T12291] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400000000000000", @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = getpid() ptrace(0x10, r1) ptrace$getsig(0x21, r1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0x3, 0x4, 0x401, 0x7fffffff, 'syz1\x00', 0x8}, 0x5, 0x4, 0x9, r1, 0xa, 0x100, 'syz1\x00', &(0x7f0000000080)=[']\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', '\x00', '/dev/ttyS3\x00', '{mime_type{]\'\x00', '/dev/ttyS3\x00', '/dev/ttyS3\x00', 'vboxnet0)nodev\'.vboxnet0\x00', '/dev/ttyS3\x00'], 0x6c, [], [0xc69, 0x20, 0x5, 0x1]}) [ 298.631931][T12332] IPVS: ftp: loaded support on port[0] = 21 03:18:37 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f4b460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924", 0x9b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:18:37 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 299.013766][T12344] ptrace attach of "/root/syz-executor.4"[12343] was attempted by "/root/syz-executor.4"[12344] 03:18:38 executing program 4: syz_emit_ethernet(0x6e, &(0x7f0000000300)={@local, @remote, @val={@void}, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x4, 0x69, 0x0, 0xf}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) [ 299.056089][T12336] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/18, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:38 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:18:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2fe00000000007}, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 299.662543][T12371] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:39 executing program 4: syz_emit_ethernet(0x6e, &(0x7f0000000300)={@local, @remote, @val={@void}, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x4, 0x69, 0x0, 0xf}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 03:18:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/18, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:39 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x10000010000193, 0x1040) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:18:39 executing program 2: socket(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000003800)={&(0x7f0000003700), 0xc, 0x0, 0x1, 0x0, 0x0, 0x801}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x2) [ 300.188367][ T1564] tipc: TX() has been purged, node left! [ 300.282938][T12390] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:39 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc3376003639405c", 0x10}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 300.813138][T12404] ptrace attach of "/root/syz-executor.4"[12403] was attempted by "/root/syz-executor.4"[12404] [ 301.965349][T12407] IPVS: ftp: loaded support on port[0] = 21 [ 302.319021][T12407] chnl_net:caif_netlink_parms(): no params data found [ 302.503824][T12407] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.515574][T12407] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.525986][T12407] device bridge_slave_0 entered promiscuous mode [ 302.543382][T12407] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.551365][T12407] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.561967][T12407] device bridge_slave_1 entered promiscuous mode [ 302.647955][T12407] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 302.672915][T12407] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 302.732692][T12407] team0: Port device team_slave_0 added [ 302.747474][T12407] team0: Port device team_slave_1 added [ 302.798235][T12407] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 302.806185][T12407] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 302.835051][T12407] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 302.850327][T12407] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 302.857763][T12407] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 302.885146][T12407] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 302.994383][T12407] device hsr_slave_0 entered promiscuous mode [ 303.047078][T12407] device hsr_slave_1 entered promiscuous mode [ 303.086276][T12407] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 303.094129][T12407] Cannot create hsr debugfs directory [ 303.338094][T12407] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 303.404608][T12407] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 303.452836][T12407] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 303.513250][T12407] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 303.714668][T12407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.741550][ T5246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.751525][ T5246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.771361][T12407] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.798804][ T5246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.811084][ T5246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.821663][ T5246] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.829374][ T5246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.838517][ T5246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.849045][ T5246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.858855][ T5246] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.867246][ T5246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.880046][ T5246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.899567][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 303.923455][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 303.950894][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 303.962462][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 303.975325][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 303.994937][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.007182][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.033554][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.044058][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.069424][T12407] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 304.082337][T12407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 304.094221][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.105193][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.151994][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 304.161119][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 304.183642][T12407] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 304.301136][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 304.312879][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.361668][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 304.371425][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.389395][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.399485][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.414418][T12407] device veth0_vlan entered promiscuous mode [ 304.443841][T12407] device veth1_vlan entered promiscuous mode [ 304.497132][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 304.507659][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 304.518001][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 304.528917][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 304.549950][T12407] device veth0_macvtap entered promiscuous mode [ 304.570485][T12407] device veth1_macvtap entered promiscuous mode [ 304.616170][T12407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 304.628796][T12407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.638986][T12407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 304.649815][T12407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.660456][T12407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 304.671185][T12407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.681391][T12407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 304.692183][T12407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.702331][T12407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 304.713061][T12407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.728325][T12407] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 304.761649][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 304.772420][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 304.782591][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 304.792617][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 304.817435][T12407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 304.828831][T12407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.838906][T12407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 304.849581][T12407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.859844][T12407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 304.870589][T12407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.880747][T12407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 304.891356][T12407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.901485][T12407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 304.912206][T12407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 304.926230][T12407] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 304.940988][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 304.951534][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 305.373797][T12652] IPVS: ftp: loaded support on port[0] = 21 03:18:44 executing program 5: socket(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x2) 03:18:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/18, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:44 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f4b460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47ffe0900000c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f05ef9c2b00e411f892151a123312f7ba3866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc008000003327", 0xee}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:18:44 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc337600", 0xc}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:18:44 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0d49933300272259ffb94b52b1fc4000002b", @ANYRES16=r2, @ANYBLOB="00012abd7000fbdbdf250200000008000400ac14140f08000500ac1414aa08000400ac1414bb14000300fc00"/58], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x2, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x8040) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="1b29074200000000000000000000000000000000000000000000215f28900000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000091a86e01692f3c8af8c3b94d000000000000000000000000000000000000000000e08500000000000000007da51b5541c93d7f12d53e5b55edaa338f1fdc96c60b7fc9f93ed026b33e0f2ee4d995919a3d61ca9dd7e265db25c01216b548cc7fdacf039cc10f12074c7886d79dda8158b928aae5b371"], 0x78) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) 03:18:44 executing program 2: socket(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000003800)={&(0x7f0000003700), 0xc, 0x0, 0x1, 0x0, 0x0, 0x801}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x2) [ 305.730381][T12682] ptrace attach of "/root/syz-executor.3"[12681] was attempted by "/root/syz-executor.3"[12682] [ 305.757262][T12687] ptrace attach of "/root/syz-executor.4"[12685] was attempted by "/root/syz-executor.4"[12687] 03:18:45 executing program 3: add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000140)="f2", 0xfffff, 0x0) [ 305.782162][T12683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9984 sclass=netlink_route_socket pid=12683 comm=syz-executor.1 03:18:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2fe00000000007}, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x2, 'vlan0\x00', {0xc3}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 305.931631][T12692] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9984 sclass=netlink_route_socket pid=12692 comm=syz-executor.1 [ 305.950221][T12686] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x693}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f00000002c0)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xb73a}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) getxattr(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x187) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000484) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 03:18:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/19, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='vlan1\x00'}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r3, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) write$UHID_INPUT(r3, &(0x7f00000002c0)={0x8, {"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", 0x1000}}, 0x1006) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$AUDIT_TTY_GET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x400, 0x70bd27, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x24044814}, 0x24008045) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:18:46 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x141}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 307.159090][T12738] ptrace attach of "/root/syz-executor.3"[12737] was attempted by "/root/syz-executor.3"[12738] [ 307.200922][T12736] ptrace attach of "/root/syz-executor.2"[12734] was attempted by "/root/syz-executor.2"[12736] [ 307.599029][T12728] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:46 executing program 5: socket(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x2) syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x2) 03:18:46 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0) 03:18:46 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x212801) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000040)='+\x00', 0x2) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000080)={0x9000000000000000, 0x4, 0x9, 0x3, 0xb}) 03:18:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/19, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) readv(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) 03:18:47 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000001580), 0x8001, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000040)=0x5) pselect6(0x40, &(0x7f0000000540), 0x0, &(0x7f0000000200)={0x1ff}, &(0x7f0000000440)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 03:18:47 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b29074200000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000800"/120], 0x78) 03:18:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}, 0x983b}, {{0x0, 0x0, 0x0}}, {{&(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000040)=""/29, 0x1d}, {&(0x7f0000000100)=""/38, 0x26}, {0x0}], 0x3}, 0x5}, {{&(0x7f0000000600)=@ax25={{0x3, @default}, [@rose, @default, @remote, @remote, @netrom, @remote, @bcast, @default]}, 0x80, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000700)=""/225, 0xe1}, {&(0x7f0000000800)=""/109, 0x6d}, {&(0x7f0000000900)=""/88, 0x58}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/111, 0x6f}], 0x6}}], 0x4, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200036150, 0x800007b, 0x0, 0x0, 0x0, 0x6a4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000004c0)='E\xed\x98\xd2hZi,\xf2\xd7\x81\xb6d\'\xaa1d\xa3\xbe\x1d\xe7\x9a=\xff\xa9@\xe2\x8aE\x91\"\xc1y\f\x83\x17\x86\xb9X\xe3]\xdc\x02\xe3\xba+\xe2\x17\x04D\xce[\xd80\xc4\x02\xa2\xcf\xce\x04\x06+e\x05\xdc\b^\xde\x90\xd7\xd1<\x00\xc6\xcb_:\xfe\x01\x00\x00\x00/\xb4\xcc\xc312\xb0i\xf9\xd8\x1e4\xdf\x05y1\xba\n\xe2Ky\xe0\xea\x87\xb9\x8cF\xe0\x15\xea\x80\x10w+\x88\x80\xaf\xad\xac\xf5\x94\xa4\xb2K1\xdf-S\r8\xd0[\xc4\x94\xfa\x83ft\x1a0\xc31C\xde\xce\xe5H\x01l\x00\xad\xf01\x1a\x83\xbdw\x7f\xc6\xe3\x9cmuTX\x99\xedh\n\x9bH\xd4`E@\xcdK\xeaz\xe8\x0f\xfe\xef\xd6P\xc7E\x94m\xef2\x8f\xa9G\xc5\x98\xb1w\xad\x1d\xa9\x9c\n\xfb\xfc\xa2\xb3\xba\x86\xe0t<\xe9.l],\xd4\xe0\x8a8\x99\b\x00\x00\x00\x1e\x8ahk6\xf1\xa2\xf6F\xad\xfd\x9b\x11\xf5\xc3R>\x02\xc9\xe1u(\xe0m}\xb4M\x8b\x8e\xd77_\xf4\x82\xbb=\x18\xcaa\xb5\x95\xfb', 0xffffffffffffffff) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYRESHEX=r4, @ANYBLOB, @ANYRESDEC, @ANYBLOB, @ANYRES16, @ANYRESHEX, @ANYRESOCT, @ANYBLOB="ec890ecb20e07bc6f599cec9b60f6375e87ec58ca34be0b3be502992d451597d5e22000f0b79f71da2982e0383e5dafd9b354f3e0cadea553e9fe0d735aa9bfc21b12b62dc428cf120e1a265352f7c9bb2e8c9f6e4b25fdb22e156ff3c3666ada0705cb578f9d3d3f63e8c4f44a5b2821ed9489efc38d2bdf53575c9a0ddfa0a7f89ab4506001f85a3db548324489a480bfb76ab128a284f7c4b"], 0x8) 03:18:48 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x41, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x0, 0x2, 0x800, 0x400}) 03:18:48 executing program 1: sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000040)=@canfd={{0x0, 0x0, 0x1, 0x1}, 0x12, 0x2, 0x0, 0x0, "da91460f5960dad4c34d01d6664b741027a2f410e4b9c864d1639316951d2243c0e850881c8424e3504bf0dc022e1500df4ccfc7df5bef62c5c33467cb7999f3"}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20001) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:18:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{&(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, 0x0}, 0x983b}, {{&(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000040)=""/29, 0x1d}, {&(0x7f0000000100)=""/38, 0x26}, {&(0x7f0000000340)=""/199, 0xc7}, {&(0x7f0000000240)=""/50, 0x32}], 0x4, &(0x7f0000000500)=""/211, 0xd3}, 0x5}, {{&(0x7f0000000600)=@ax25={{0x3, @default}, [@rose, @default, @remote, @remote, @netrom, @remote, @bcast, @default]}, 0x80, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000800)=""/109, 0x6d}, {&(0x7f0000000900)=""/88, 0x58}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/111, 0x6f}], 0x5, &(0x7f0000002580)=""/4096, 0x1000}, 0x3f}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200036150, 0x800007b, 0x0, 0x0, 0x0, 0x6a4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000004c0)='E\xed\x98\xd2hZi,\xf2\xd7\x81\xb6d\'\xaa1d\xa3\xbe\x1d\xe7\x9a=\xff\xa9@\xe2\x8aE\x91\"\xc1y\f\x83\x17\x86\xb9X\xe3]\xdc\x02\xe3\xba+\xe2\x17\x04D\xce[\xd80\xc4\x02\xa2\xcf\xce\x04\x06+e\x05\xdc\b^\xde\x90\xd7\xd1<\x00\xc6\xcb_:\xfe\x01\x00\x00\x00/\xb4\xcc\xc312\xb0i\xf9\xd8\x1e4\xdf\x05y1\xba\n\xe2Ky\xe0\xea\x87\xb9\x8cF\xe0\x15\xea\x80\x10w+\x88\x80\xaf\xad\xac\xf5\x94\xa4\xb2K1\xdf-S\r8\xd0[\xc4\x94\xfa\x83ft\x1a0\xc31C\xde\xce\xe5H\x01l\x00\xad\xf01\x1a\x83\xbdw\x7f\xc6\xe3\x9cmuTX\x99\xedh\n\x9bH\xd4`E@\xcdK\xeaz\xe8\x0f\xfe\xef\xd6P\xc7E\x94m\xef2\x8f\xa9G\xc5\x98\xb1w\xad\x1d\xa9\x9c\n\xfb\xfc\xa2\xb3\xba\x86\xe0t<\xe9.l],\xd4\xe0\x8a8\x99\b\x00\x00\x00\x1e\x8ahk6\xf1\xa2\xf6F\xad\xfd\x9b\x11\xf5\xc3R>\x02\xc9\xe1u(\xe0m}\xb4M\x8b\x8e\xd77_\xf4\x82\xbb=\x18\xcaa\xb5\x95\xfb', 0xffffffffffffffff) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYRESHEX=r4, @ANYBLOB, @ANYRESDEC, @ANYBLOB, @ANYRES16, @ANYRESHEX, @ANYRESOCT, @ANYBLOB="ec890ecb20e07bc6f599cec9b60f6375e87ec58ca34be0b3be502992d451597d5e22000f0b79f71da2982e0383e5dafd9b354f3e0cadea553e9fe0d735aa9bfc21b12b62dc428cf120e1a265352f7c9bb2e8c9f6e4b25fdb22e156ff3c3666ada0705cb578f9d3d3f63e8c4f44a5b2821ed9489efc38d2bdf53575c9a0ddfa0a7f89ab4506001f85a3db548324489a480bfb76ab128a284f7c4b"], 0x8) 03:18:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x197}, [{0x5, 0x0, 0x400000000000000, 0x2, 0x4, 0x0, 0xfffffffffffffffc}], "6ac86a23c37fb964df76317c1555aff9f16d1ec5f2af000408c06f7e6ef2a96c4efea2b6b06411c3389337d2c2aa032e63953b69e4f21d002b4b2e8f2518598abbe3d59c926386070c564301a21f74b5b0044d7b8c263ff52a98364f7fc693b47546066fd2579f98"}, 0xe0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000000)={0x3, 0x9, 0x3, 0x6, 0x3, 0xb92}) r1 = openat$autofs(0xffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0xc00, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0xab5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r2, 0x541c, &(0x7f0000000200)) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x1f, 0x2, 0x7, 0x7, 0x0, 0x40, 0x40, 0xe, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x80, 0x1}, 0x2800, 0x4, 0x8eb4, 0x1, 0x8, 0x0, 0x200}, 0x0, 0x0, r1, 0xa) [ 309.272682][T12762] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:48 executing program 5: pipe(&(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001580), 0x8001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000540), 0x0, &(0x7f0000000200)={0x1ff}, 0x0, 0x0) 03:18:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x7e, &(0x7f0000000a00)={@link_local={0x3}, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "bf6e00", 0x2, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2d]}, @mcast2, {[], @echo_request}}}}}, 0x0) 03:18:49 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000540), 0x0, &(0x7f0000000200)={0x1ff}, &(0x7f0000000440)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 03:18:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/19, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:49 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x453, 0x0, 0x0, 0x0, "fd", ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:49 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x1, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x800, 0x8a, 0x40, 0xfffffffffffffffd, 0x0, 0x0, 0x38, 0x0, 0xfffd, 0x0, 0xffff}, [{0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffe}]}, 0x78) r1 = open(&(0x7f0000000280)='.\x00', 0x101000, 0x1b4) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0106434, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x8}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40086436, &(0x7f0000000040)={r2, 0xfffffffb}) [ 310.288548][T12837] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 310.323476][ T32] audit: type=1107 audit(1588735129.590:11): pid=12834 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 msg='ý' 03:18:49 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000080)) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000040)={0x7, 0x0, 0x800}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000300)=ANY=[@ANYRES64=0x0], 0x78) 03:18:49 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) 03:18:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{&(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, 0x0}, 0x983b}, {{0x0, 0x0, 0x0}}, {{&(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000340)=""/199, 0xc7}, {&(0x7f0000000240)=""/50, 0x32}], 0x3, &(0x7f0000000500)=""/211, 0xd3}, 0x5}, {{&(0x7f0000000600)=@ax25={{0x3, @default}, [@rose, @default, @remote, @remote, @netrom, @remote, @bcast, @default]}, 0x80, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000700)=""/225, 0xe1}, {&(0x7f0000000800)=""/109, 0x6d}, {&(0x7f0000000900)=""/88, 0x58}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/111, 0x6f}], 0x6, &(0x7f0000002580)=""/4096, 0x1000}, 0x3f}], 0x4, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200036150, 0x800007b, 0x0, 0x0, 0x0, 0x6a4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000004c0)='E\xed\x98\xd2hZi,\xf2\xd7\x81\xb6d\'\xaa1d\xa3\xbe\x1d\xe7\x9a=\xff\xa9@\xe2\x8aE\x91\"\xc1y\f\x83\x17\x86\xb9X\xe3]\xdc\x02\xe3\xba+\xe2\x17\x04D\xce[\xd80\xc4\x02\xa2\xcf\xce\x04\x06+e\x05\xdc\b^\xde\x90\xd7\xd1<\x00\xc6\xcb_:\xfe\x01\x00\x00\x00/\xb4\xcc\xc312\xb0i\xf9\xd8\x1e4\xdf\x05y1\xba\n\xe2Ky\xe0\xea\x87\xb9\x8cF\xe0\x15\xea\x80\x10w+\x88\x80\xaf\xad\xac\xf5\x94\xa4\xb2K1\xdf-S\r8\xd0[\xc4\x94\xfa\x83ft\x1a0\xc31C\xde\xce\xe5H\x01l\x00\xad\xf01\x1a\x83\xbdw\x7f\xc6\xe3\x9cmuTX\x99\xedh\n\x9bH\xd4`E@\xcdK\xeaz\xe8\x0f\xfe\xef\xd6P\xc7E\x94m\xef2\x8f\xa9G\xc5\x98\xb1w\xad\x1d\xa9\x9c\n\xfb\xfc\xa2\xb3\xba\x86\xe0t<\xe9.l],\xd4\xe0\x8a8\x99\b\x00\x00\x00\x1e\x8ahk6\xf1\xa2\xf6F\xad\xfd\x9b\x11\xf5\xc3R>\x02\xc9\xe1u(\xe0m}\xb4M\x8b\x8e\xd77_\xf4\x82\xbb=\x18\xcaa\xb5\x95\xfb', 0xffffffffffffffff) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB, @ANYRES16, @ANYRESHEX, @ANYRESOCT, @ANYBLOB="ec890ecb20e07bc6f599cec9b60f6375e87ec58ca34be0b3be502992d451597d5e22000f0b79f71da2982e0383e5dafd9b354f3e0cadea553e9fe0d735aa9bfc21b12b62dc428cf120e1a265352f7c9bb2e8c9f6e4b25fdb22e156ff3c3666ada0705cb578f9d3d3f63e8c4f44a5b2821ed9489efc38d2bdf53575c9a0ddfa0a7f89ab4506001f85a3db548324489a480bfb76ab128a"], 0x8) 03:18:50 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x453, 0x0, 0x0, 0x0, "fd", ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 311.004086][T12854] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 311.025566][T12854] device bridge14 entered promiscuous mode [ 311.046055][ T32] audit: type=1107 audit(1588735130.310:12): pid=12855 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 msg='ý' 03:18:50 executing program 5: pipe(&(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001580), 0x8001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000540), 0x0, &(0x7f0000000200)={0x1ff}, 0x0, 0x0) 03:18:50 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x453, 0x0, 0x0, 0x0, "fd", ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:50 executing program 4: pipe(&(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001580), 0x8001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000540), 0x0, &(0x7f0000000200)={0x1ff}, 0x0, 0x0) 03:18:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}, 0x983b}, {{0x0, 0x0, 0x0}}, {{&(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000040)=""/29, 0x1d}, {&(0x7f0000000100)=""/38, 0x26}, {0x0}], 0x3}, 0x5}, {{&(0x7f0000000600)=@ax25={{0x3, @default}, [@rose, @default, @remote, @remote, @netrom, @remote, @bcast, @default]}, 0x80, &(0x7f00000024c0)=[{0x0}, {0x0}, {&(0x7f0000000900)=""/88, 0x58}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/111, 0x6f}], 0x5}}], 0x4, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200036150, 0x800007b, 0x0, 0x0, 0x0, 0x6a4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000004c0)='E\xed\x98\xd2hZi,\xf2\xd7\x81\xb6d\'\xaa1d\xa3\xbe\x1d\xe7\x9a=\xff\xa9@\xe2\x8aE\x91\"\xc1y\f\x83\x17\x86\xb9X\xe3]\xdc\x02\xe3\xba+\xe2\x17\x04D\xce[\xd80\xc4\x02\xa2\xcf\xce\x04\x06+e\x05\xdc\b^\xde\x90\xd7\xd1<\x00\xc6\xcb_:\xfe\x01\x00\x00\x00/\xb4\xcc\xc312\xb0i\xf9\xd8\x1e4\xdf\x05y1\xba\n\xe2Ky\xe0\xea\x87\xb9\x8cF\xe0\x15\xea\x80\x10w+\x88\x80\xaf\xad\xac\xf5\x94\xa4\xb2K1\xdf-S\r8\xd0[\xc4\x94\xfa\x83ft\x1a0\xc31C\xde\xce\xe5H\x01l\x00\xad\xf01\x1a\x83\xbdw\x7f\xc6\xe3\x9cmuTX\x99\xedh\n\x9bH\xd4`E@\xcdK\xeaz\xe8\x0f\xfe\xef\xd6P\xc7E\x94m\xef2\x8f\xa9G\xc5\x98\xb1w\xad\x1d\xa9\x9c\n\xfb\xfc\xa2\xb3\xba\x86\xe0t<\xe9.l],\xd4\xe0\x8a8\x99\b\x00\x00\x00\x1e\x8ahk6\xf1\xa2\xf6F\xad\xfd\x9b\x11\xf5\xc3R>\x02\xc9\xe1u(\xe0m}\xb4M\x8b\x8e\xd77_\xf4\x82\xbb=\x18\xcaa\xb5\x95\xfb', 0xffffffffffffffff) 03:18:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000180)=0x8) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r3, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000700)={r6, @in={{0x2, 0x0, @multicast1}}}, &(0x7f00000007c0)=0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000000)={r6, 0xfffffffd}, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x6, 0x38, 0x0, 0xfc}, [{0x5, 0x80000000, 0x0, 0xddc, 0x0, 0x0, 0xfffffffffffffffc}]}, 0x78) 03:18:50 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) [ 311.509462][ T32] audit: type=1107 audit(1588735130.780:13): pid=12872 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 msg='ý' [ 311.637736][T12879] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 311.659213][T12879] device bridge15 entered promiscuous mode 03:18:51 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x453, 0x0, 0x0, 0x0, "fd", ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:51 executing program 2: pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001580), 0x8001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) pselect6(0x40, &(0x7f0000000540), 0x0, &(0x7f0000000200)={0x1ff}, &(0x7f0000000440)={0x0, r2+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 03:18:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000700)={r5, @in={{0x2, 0x0, @multicast1}}}, &(0x7f00000007c0)=0x84) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r6, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x7, "56a46f", "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"}}, 0x110) r8 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r8, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) write$cgroup_subtree(r8, &(0x7f0000000180)={[{0x2d, 'memory'}]}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000100)={r5, 0xde, 0x81}, &(0x7f0000000140)=0x8) ioctl$KDDELIO(r1, 0x4b35, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b29074200000000000000000000000000000000000000000000000000000000400000000000684300000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006433afbb6adcdc11ccf101da5035dad8f01cb6d7394303adf963f4f688c6ff0f000000000000c6a927e1ac027a227081d98574e2c9ffdcbab129bd739cc859cbd5c7fd6ea678cca8073a3ec3567de2e8bb90e273899307a90fab100f923219935847263f8424b0a9d613850e5e00"/242], 0x78) 03:18:51 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x58}}, 0x0) [ 312.185549][ T32] audit: type=1107 audit(1588735131.450:14): pid=12895 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 msg='ý' 03:18:51 executing program 3: sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x453, 0x0, 0x0, 0x0, "fd", ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:51 executing program 5: [ 312.549751][T12908] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 312.611935][T12908] device bridge16 entered promiscuous mode 03:18:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f00000000c0)={0x3}) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r1], 0x78) 03:18:51 executing program 4: 03:18:52 executing program 3: sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x453, 0x0, 0x0, 0x0, "fd", ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 03:18:52 executing program 5: 03:18:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000080)={0x4, @dev={0xac, 0x14, 0x14, 0x28}, 0x4e22, 0x0, 'sed\x00', 0x0, 0x9, 0x7a}, 0x22) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:18:52 executing program 4: 03:18:52 executing program 2: [ 313.171820][T12924] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 313.232726][T12924] device bridge17 entered promiscuous mode 03:18:52 executing program 3: sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x453, 0x0, 0x0, 0x0, "fd", ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:52 executing program 5: 03:18:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 03:18:52 executing program 2: 03:18:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x3, 0x6, 0x1, 0x2, 0x8, "e985eb9b4b22fc82865e705acf87e9698561bf"}) 03:18:52 executing program 4: 03:18:53 executing program 5: 03:18:53 executing program 3: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x453, 0x0, 0x0, 0x0, "fd", ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 313.862662][T12941] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 313.886672][T12941] device bridge18 entered promiscuous mode 03:18:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2711, @host}, 0x10, 0x80800) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000040)={0x2, 'gretap0\x00', {0x36dd}, 0x6}) 03:18:53 executing program 2: 03:18:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 03:18:53 executing program 4: 03:18:53 executing program 5: 03:18:53 executing program 3: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x453, 0x0, 0x0, 0x0, "fd", ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:53 executing program 2: 03:18:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1}, [{0x3, 0x6, 0x1, 0x0, 0x1d, 0x4150c759, 0x64, 0x3}, {0x60000000, 0x1f, 0xff, 0xa0b1, 0x2, 0x6, 0x3, 0xfffffffffffffffd}], "7542b9e4c8f78e848c1fa02d", [[], [], [], [], []]}, 0x5bc) [ 314.505564][T12959] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 314.526445][T12959] device bridge19 entered promiscuous mode 03:18:53 executing program 4: 03:18:53 executing program 5: 03:18:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 03:18:54 executing program 2: 03:18:54 executing program 3: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x453, 0x0, 0x0, 0x0, "fd", ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:54 executing program 4: 03:18:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x40}, [{}]}, 0x78) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x44, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, r3, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd45}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x200}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x44}}, 0x20000000) [ 315.113271][T12973] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 315.134768][T12973] device bridge20 entered promiscuous mode 03:18:54 executing program 5: 03:18:54 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, 0x0, 0x0) 03:18:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 03:18:54 executing program 2: 03:18:54 executing program 4: 03:18:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0246400, &(0x7f0000000280)={0xc0b, 0x15c91ea2, 0xefa, 0xa7, &(0x7f0000000000)=""/167, 0x6, &(0x7f00000000c0)=""/6, 0xf6, &(0x7f0000000180)=""/246}) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:18:54 executing program 5: [ 315.769463][T12990] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 315.839548][T12990] device bridge21 entered promiscuous mode 03:18:55 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, 0x0, 0x0) 03:18:55 executing program 5: 03:18:55 executing program 2: 03:18:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 03:18:55 executing program 4: 03:18:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40100, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x3, {0xffffff09, 0x3, "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", 0x6, 0x0, 0x1, 0x80, 0x7, 0x4, 0x39, 0x1}, r4}}, 0x128) 03:18:55 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, 0x0, 0x0) [ 316.379105][T13007] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 316.399898][T13007] device bridge22 entered promiscuous mode 03:18:55 executing program 5: 03:18:55 executing program 2: 03:18:55 executing program 4: 03:18:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 03:18:56 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:56 executing program 5: 03:18:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="3314ec9ed7df15a4431b290342000000000000000000000000000000000000000000000000000000004000000000000000000020000000000000ff0f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000"], 0x78) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x541c, &(0x7f0000000000)) [ 316.952827][T13025] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:56 executing program 2: [ 317.017467][T13025] device bridge23 entered promiscuous mode 03:18:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 03:18:56 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:56 executing program 4: 03:18:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b29074200000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000500"/120], 0x78) r1 = openat$hwrng(0xffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$VIDIOC_QBUF(r1, 0xc044560f, &(0x7f0000000040)={0x6, 0xb, 0x4, 0x2000, 0xfffffffb, {0x77359400}, {0x1, 0x8, 0x1, 0xf9, 0xbf, 0x3, "2296e1a2"}, 0x400, 0x1, @offset=0xffffffff, 0x7fffffff}) 03:18:56 executing program 5: 03:18:57 executing program 2: [ 318.113461][T13052] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 318.136121][T13052] device bridge24 entered promiscuous mode 03:18:57 executing program 4: 03:18:57 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000000080), 0x0, 0x20002020, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f00000000c0)={0x3}) r3 = signalfd4(r2, &(0x7f0000000080)={[0x1fffc, 0x1]}, 0x8, 0x800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000000c0)=0x5a5) r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r4, 0xc02c5638, &(0x7f00000000c0)={0x3}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r4, 0xc0445609, &(0x7f0000000140)={0x4, 0xa, 0x4, 0x40000, 0x925e, {r5, r6/1000+10000}, {0x2, 0x8, 0x20, 0x1f, 0x40, 0x80, "796562f2"}, 0x8, 0x4, @userptr=0x2, 0x1f, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r7, 0xc08c5334, &(0x7f00000001c0)={0x3, 0x2, 0x1, 'queue1\x00', 0x2}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) syz_open_dev$tty1(0xc, 0x4, 0x1) 03:18:57 executing program 5: 03:18:57 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 03:18:57 executing program 2: 03:18:57 executing program 4: 03:18:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x8}, [{}]}, 0x78) 03:18:58 executing program 5: [ 318.764340][T13067] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 318.785213][T13067] device bridge25 entered promiscuous mode 03:18:58 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:58 executing program 2: 03:18:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:58 executing program 4: 03:18:58 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) write$binfmt_elf64(r0, &(0x7f0000000180)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0xff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x800, 0x398, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0xffff}, [{0x0, 0x0, 0x0, 0xb51, 0x1, 0x0, 0x5e00}], "", [[], [], [], [], [], []]}, 0x678) 03:18:58 executing program 5: 03:18:58 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:58 executing program 2: [ 319.401843][T13084] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 319.422596][T13084] device bridge26 entered promiscuous mode 03:18:58 executing program 4: 03:18:59 executing program 5: 03:18:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000080)={@fixed={[], 0x10}, 0x9}) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8800, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x4, 0x300f}) 03:18:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:59 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:59 executing program 2: [ 320.080157][T13106] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:18:59 executing program 4: [ 320.138249][T13106] device bridge27 entered promiscuous mode 03:18:59 executing program 5: 03:18:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f00000000c0)={0x3}) ioctl$VIDIOC_ENUMSTD(r1, 0xc0405619, &(0x7f0000000000)={0xb7, 0x1700, "db7d942aa99f34c5d0c0b3dedf3eff5460573d1145cf0ef2", {0x3, 0x637}, 0x1ff}) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x29, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:18:59 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x453, 0x0, 0x0, 0x0, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:18:59 executing program 2: 03:18:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0001000000000000240012000c000100627269646765"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x58}}, 0x0) 03:18:59 executing program 4: [ 320.683138][T13123] ===================================================== [ 320.690234][T13123] BUG: KMSAN: uninit-value in string+0x522/0x690 [ 320.697513][T13123] CPU: 0 PID: 13123 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 320.706690][T13123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.717328][T13123] Call Trace: [ 320.721026][T13123] dump_stack+0x1c9/0x220 [ 320.725416][T13123] kmsan_report+0xf7/0x1e0 [ 320.729897][T13123] __msan_warning+0x58/0xa0 [ 320.734536][T13123] string+0x522/0x690 [ 320.739009][T13123] vsnprintf+0x207d/0x31b0 [ 320.744791][T13123] audit_log_vformat+0x583/0xcd0 [ 320.750075][T13123] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 320.756111][T13123] audit_log_format+0x220/0x260 [ 320.761158][T13123] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 320.767236][T13123] audit_receive+0x18a4/0x6d50 [ 320.772458][T13123] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 320.778666][T13123] ? netlink_deliver_tap+0xdba/0xea0 [ 320.784749][T13123] ? kmsan_get_metadata+0x11d/0x180 [ 320.790249][T13123] netlink_unicast+0xf9e/0x1100 [ 320.795972][T13123] ? audit_net_exit+0xd0/0xd0 [ 320.800812][T13123] netlink_sendmsg+0x1246/0x14d0 [ 320.806045][T13123] ? netlink_getsockopt+0x1440/0x1440 [ 320.811676][T13123] ____sys_sendmsg+0x12b6/0x1350 [ 320.816708][T13123] __sys_sendmsg+0x451/0x5f0 [ 320.821475][T13123] ? kmsan_get_metadata+0x11d/0x180 [ 320.827063][T13123] ? kmsan_get_metadata+0x11d/0x180 [ 320.832315][T13123] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 320.838151][T13123] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 320.844263][T13123] ? prepare_exit_to_usermode+0x1ca/0x520 [ 320.850034][T13123] ? kmsan_get_metadata+0x4f/0x180 [ 320.855199][T13123] ? kmsan_get_metadata+0x4f/0x180 [ 320.860353][T13123] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 320.866198][T13123] __ia32_compat_sys_sendmsg+0xed/0x130 [ 320.871796][T13123] ? compat_mc_getsockopt+0x19a0/0x19a0 [ 320.877643][T13123] do_fast_syscall_32+0x3c7/0x6e0 [ 320.882740][T13123] entry_SYSENTER_compat+0x68/0x77 [ 320.888479][T13123] RIP: 0023:0xf7f7dd99 [ 320.893527][T13123] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 320.914027][T13123] RSP: 002b:00000000f5d780cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 320.922643][T13123] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 [ 320.930637][T13123] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 320.938715][T13123] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 320.946712][T13123] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 320.954712][T13123] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 320.962916][T13123] [ 320.965264][T13123] Uninit was created at: [ 320.969534][T13123] kmsan_internal_poison_shadow+0x66/0xd0 [ 320.975302][T13123] kmsan_slab_alloc+0x8a/0xe0 [ 320.980014][T13123] __kmalloc_node_track_caller+0xb40/0x1200 [ 320.986107][T13123] __alloc_skb+0x2fd/0xac0 [ 320.990535][T13123] netlink_sendmsg+0x7d3/0x14d0 [ 320.995403][T13123] ____sys_sendmsg+0x12b6/0x1350 [ 321.000363][T13123] __sys_sendmsg+0x451/0x5f0 [ 321.004973][T13123] __ia32_compat_sys_sendmsg+0xed/0x130 [ 321.010762][T13123] do_fast_syscall_32+0x3c7/0x6e0 [ 321.015817][T13123] entry_SYSENTER_compat+0x68/0x77 [ 321.021310][T13123] ===================================================== [ 321.028355][T13123] Disabling lock debugging due to kernel taint [ 321.034911][T13123] Kernel panic - not syncing: panic_on_warn set ... [ 321.041710][T13123] CPU: 0 PID: 13123 Comm: syz-executor.3 Tainted: G B 5.6.0-rc7-syzkaller #0 [ 321.051805][T13123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.062006][T13123] Call Trace: [ 321.065382][T13123] dump_stack+0x1c9/0x220 [ 321.069762][T13123] panic+0x3d5/0xc3e [ 321.073755][T13123] kmsan_report+0x1df/0x1e0 [ 321.078496][T13123] __msan_warning+0x58/0xa0 [ 321.083050][T13123] string+0x522/0x690 [ 321.087109][T13123] vsnprintf+0x207d/0x31b0 [ 321.091633][T13123] audit_log_vformat+0x583/0xcd0 [ 321.097080][T13123] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 321.103028][T13123] audit_log_format+0x220/0x260 [ 321.107969][T13123] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 321.113819][T13123] audit_receive+0x18a4/0x6d50 [ 321.118730][T13123] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 321.124844][T13123] ? netlink_deliver_tap+0xdba/0xea0 [ 321.130312][T13123] ? kmsan_get_metadata+0x11d/0x180 [ 321.135558][T13123] netlink_unicast+0xf9e/0x1100 [ 321.140615][T13123] ? audit_net_exit+0xd0/0xd0 [ 321.145334][T13123] netlink_sendmsg+0x1246/0x14d0 [ 321.150340][T13123] ? netlink_getsockopt+0x1440/0x1440 [ 321.155742][T13123] ____sys_sendmsg+0x12b6/0x1350 [ 321.160751][T13123] __sys_sendmsg+0x451/0x5f0 [ 321.165400][T13123] ? kmsan_get_metadata+0x11d/0x180 [ 321.170880][T13123] ? kmsan_get_metadata+0x11d/0x180 [ 321.176556][T13123] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 321.185538][T13123] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 321.191648][T13123] ? prepare_exit_to_usermode+0x1ca/0x520 [ 321.197410][T13123] ? kmsan_get_metadata+0x4f/0x180 [ 321.202561][T13123] ? kmsan_get_metadata+0x4f/0x180 [ 321.208312][T13123] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 321.214160][T13123] __ia32_compat_sys_sendmsg+0xed/0x130 [ 321.219746][T13123] ? compat_mc_getsockopt+0x19a0/0x19a0 [ 321.225324][T13123] do_fast_syscall_32+0x3c7/0x6e0 [ 321.230407][T13123] entry_SYSENTER_compat+0x68/0x77 [ 321.235549][T13123] RIP: 0023:0xf7f7dd99 [ 321.239633][T13123] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 321.259440][T13123] RSP: 002b:00000000f5d780cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 321.267885][T13123] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 [ 321.275883][T13123] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 321.283877][T13123] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 321.291879][T13123] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 321.299872][T13123] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 321.309283][T13123] Kernel Offset: 0x1c800000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 321.321044][T13123] Rebooting in 86400 seconds..